Download presentation
Presentation is loading. Please wait.
Published byLynne Weaver Modified over 6 years ago
1
Lessons Learned: Implementing a Vulnerability Management Program
Michael Zimmer Information Security Analyst, Northern Arizona University Grant Johnson Technical Account Manager, Qualys
2
Who Are We In addition to all of that, we are situated in the largest Ponderosa Pine Forest in the world at 6,000 feet elevation and we get snow. Yes, in AZ we get snow. Also, it’s about an 80-minute drive to Grand Canyon.
3
Why Vulnerability Management?
4
Our Challenges Leadership Support Training & Learning
Budget & Resources
5
Our Challenges Change Management Ease Fear & Reduce Doubt
Inventory of Critical Assets
6
Our Approach Training and Learning Find free training
In-person, online Reference guides Demos or videos
7
Our Approach Build a Current Inventory Qualys Maps can Help
Meet with Admins, Team Leads
8
Our Approach Organize the Assets Asset Groups Tags Easier to scan
Easier to report Easier to distribute permissions
9
Our Approach Start slow, with low impact scans
Get baseline scans, reports Meet with admins to review Identify critical vulnerabilities Remediate and rescan Rinse and repeat
10
Our Results Continuous Monitoring Scheduled scans Credentialed Scans
Once per year currently Required Remediation Levels Confirmed 4s & 5s are to be fixed
11
Results Sample Views Red = Confirmed Yellow = Potential
12
Lessons Learned Leadership Support Inventory Build, Organize, Maintain
Relationship Building Start Slow, Low Impact Initial Scans Schedule Scans & Reports Mix of Internal & External Scans Authenticated Scanning
13
What Lies Ahead Credentialed/Authenticated Scans
Integrations with other products Splunk ServiceNow ticketing Scanning-as-a-Service Offer to scan department nets Web Application Scanning We are just starting up!
14
Best Practices for VM Change from Michael, NAU, to Grant and Qualys.
15
Scan Frequency Scan Interval should match the risk of loss associated with the data and system or patch cycles Frequency can range from monthly/bi monthly to continuous – Mind the GAP Scan signature should be VERY current – Auto-update is recommended
16
Scan Exclusions Some systems should not be scanned BUT make them prove it! Document, Document, Document….Formalize this process Remove the entire device from scanning – Don’t exclude test (IMHO) Exclusions should be formally reviewed at regular intervals – by the data owners Scan signature should be VERY current – Auto-update is recommended
17
Figuring out where to start.. Three Risks to consider..
1 Public and Customer- Facing systems need to be prioritized Public Network 2 - Have a defined data classification scheme - Need to know where the data is stored - Need to know how the data gets there
18
Risk Based Vulnerability Strategy How do you priorities which high severity findings to fix first?
Prioritize vulnerabilities with known exploits and malware. Good VM tools constantly correlate exploitability information from real-time feeds to provide up to date references to exploits and related security resources. 3 Prioritize the vulnerability can be exploited from the outside or detected via (unauthenticated) scanning. Death of a million Begin with vulnerabilities that are fixable. Give IT actionable information Exclude Zero day vulnerabilities from metrics
19
Vulnerability Metrics
Target metrics to the non-technical data owners - not just IT Report the number of vulnerabilities FIXED over the last number of days or since last scan Average age of the vulnerabilities – reduces impact of individual Missing Patches are a good starting point Report % of coverage and % Authenticated Report “risk accepted” vulnerabilities along side others - “risk accepted does not mean risk mitigated… Report exclusions – hosts, vulnerabilities, times, etc.. Interval – weekend only – afterhours scanning…
20
Maybe you could do some key takeaways as a wrap up – and both you and Grant present? Will leave this one to Grant.
21
Some Good Free References WWW.qualys.com/freetools
22
Q&A
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.