Cost-effective approach to full-cycle vulnerability management

438 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
438
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
15
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cost-effective approach to full-cycle vulnerability management

  1. 1. Cost-effective approach to full-cycle vulnerability management Sumita Chotani 13th November 2012 Company Confidential
  2. 2. Common Issues across SMB 2  One man army  Security is not a priority  Upper Management wants results  Time is of the essence  User friendly product is imperative
  3. 3. AUTOMATION is the key 3 What can you automate?  Identifying your Network Topology and Asset Management?  Vulnerability Assessment of the network?  Reporting the findings of the assessment?  Remediation workflow via a ticketing system?
  4. 4. Identifying your network topology and Asset Management 4  Discover, understand and organize your network and the people managing the systems 3 Basic Steps: o Run Scheduled maps* o Form Asset Groups around the existing logical structure o Assign each Asset Group to its respective owner Map ~ Network discovery
  5. 5. Identifying your network topology and Asset Management 5
  6. 6. 6 Identifying your network topology and Asset Management
  7. 7. 7 Identifying your network topology and Asset Management
  8. 8. Identifying your network topology and Asset Management 8
  9. 9. Vulnerability Assessment of the network 9  Periodic scanning of all perimeter and internal systems E.g. o Nightly scans of Production Environment o Weekly scans Critical servers and workstations o Monthly scans of entire network pre and post Patch Tuesday
  10. 10. Vulnerability Assessment of the network 10
  11. 11. 11 Reporting the findings of the assessment  Actionable Report o Patch Report • One Interactive Report: - View of a Patch Matrix - Patch – Host Mapping - Link to download the Patch  Schedule report generation
  12. 12. 12 Reporting the findings of the assessment
  13. 13. 13 Reporting the findings of the assessment
  14. 14. 14 Setting up a Remediation workflow via a ticketing system  Need for Closed Loop Ticketing System
  15. 15. 15 Setting up a Remediation workflow via a ticketing system  Closing Open Tickets
  16. 16. 16 Setting up a Remediation workflow via a ticketing system  Reopening Closed Tickets
  17. 17. 17 Setting up a Remediation workflow via a ticketing system
  18. 18. 18 Setting up a Remediation workflow via a ticketing system
  19. 19. Check - List 19  Automated Inventory Lookup ✓  Asset Management and Delegation ✓  Automated Scanning ✓  Automated Report Generation ✓  Reports for Patch Management ✓  Automated Remediation Workflow ✓
  20. 20. 20 Reduce workload for everyone through automation and prioritisation
  21. 21. schotani@qualys.com Thank You © 1999–2012 Qualys, Inc. All rights reserved.

×