During the Harden phase of the Harden, Detect, and Respond process, a company focuses on finding weaknesses in its systems, people, software, and more. These weaknesses are known as vulnerabilities, which an attacker will attempt to discover and exploit. After exploitation, an attacker can perform nefarious actions that may lead to the compromise and takeover of a device or account. One of the key cycles of Harden is the vulnerability management phase.
Finding vulnerabilities in a network environment and remediating those vulnerabilities reduces the potential for compromise during an attack. As hackers take the path of least resistance, the most severe vulnerabilities are often targeted and chained together to gain control. Therefore, it's critical to establish a consistent process for the identification and remediation of vulnerabilities. This is no small task, and the enterprise will certainly face the following challenges.
Vulnerability management…
In addition to these direct challenges, there are big-picture industry-wide challenges that further complicate things. Recently, the National Institute of Standards has been in the news regarding its delay in publishing vulnerabilities into the national vulnerability database. This means enterprises relying on these databases have been forced to search for alternate sources to keep their software packages integral.
These problems will never cease. There is no finish line, but the following can support an enterprise's vulnerability management efforts.
Vulnerability management is one process in the Harden phase of Harden, Detect, and Respond. It's a critical piece in negating cyber-attacks and is empirical to the success of a cybersecurity program. A vulnerability management program must be capable of identifying vulnerabilities and must have an established process for remediation through the implementation of software patches and updates.