Configuration and Vulnerability Management
Configuration & Change Management
- Helps in preventing incidents and outages.
Configuration Management
- Aims to ensure similar system configurations.
- Makes sure configurations are well-documented and known.
Baselining
- Ensures systems start from a common baseline or reference point.
- Methods: Imaging and reimaging.
- Policy-Based Configuration: Ensures consistency in baselining.
Continuous scanning can help ensure system consistency and detect policy bypasses.
Change Management
- Reduces risks of outages or weakened security from unauthorized changes.
- Ensures changes are discussed, documented, and mutually agreed upon.
- Change management also addresses the "deter" principle, ensuring unauthorized changes are discouraged.
Versioning
- Uses labels or number systems to track software changes.
- Requires changes to be requested, approved, tested, and documented.
Think of CAB (Change Advisory Board) in the ITIL methodology.
Patch Management
Ensures systems remain up-to-date with current security patches.
- Large Companies: Formalized process.
- Small to Medium Businesses: Less formal process.
- Smallest Businesses: Often automatic updates, e.g., Windows.
Without patch management, organizations risk outages from known issues that could've been avoided through patching.
The patch management process is to:
- ⬇️ Evaluate patches
- ⬇️ Test Patches
- ⬇️ Approve the patches
- ⬇️ Deploy the patches
- ⬇️ Verify the patches are deployed
After verifying patch deployment, utilize vulnerability scans to identify any missing patches. A System Audit can verify the deployment of approved patches.
Intertwine patch management with change and configuration management to ensure documentation remains updated.
Vulnerability Management
- Involves routine vulnerability scans and periodic vulnerability assessments.
- Often comes quoted with penetration tests.
- Proactive organizations should conduct their own vulnerability scans regularly.
Vulnerability Scanners
- Tools designed to detect known security vulnerabilities and weaknesses.
- Examples include issues like missing patches or weak passwords.
- Examples of companies offering vulnerability scanning: Qualys, Nessus (by Tenable), Rapid7, and OpenVAS.
Vulnerability Assessments
- More comprehensive than mere technical scans.
- Includes reviews, audits, and specialized analyses to understand and address vulnerabilities.
- Vulnerability assessments dive deeper, using specialized knowledge to elevate vulnerability information.
Incident Management
-
Detection
- Tools: Monitoring tools, IPS, Firewalls
- Who gets Notified: Management and/or help desk
- Tools: Monitoring tools, IPS, Firewalls
-
Response
- Actions: Triage (Is this an incident?), Declare if true
- Objective: Limit damage
-
Mitigation
- First Step: Contain the incident
- Form a Team: For handling and scoping
-
Reporting
- Who to Report: Stakeholders (customers, vendors, law enforcement)
- Decision Maker: Management
-
Recovery
- Objective: Return to normal operations
- Decision Maker: Management
-
Remediation
- Focus: Address the root cause
-
Lessons Learned
- Benefits: Prevent recurrence, improve response process
DRMRRRL (Drumroll) is a helpful mnemonic for remembering the incident management steps.
Blocking Malicious Code
Anti-Malware Software
- Install on every system.
- Ensure placement at network boundaries and on email servers.
- Modern anti-malware solutions incorporate AI and ML techniques to detect unique, previously unseen threats.
Policies
- Enforce security principles like the principle of least privilege.
- Prevent users from potential risks like installing unauthorized software and browser extensions.
Beware of risks like local admin privileges.
Education
- Security Awareness Training (SAT) about risks and methods to spread malware.
- Regular short 30-minute presentations training sessions (e.g., quarterly) can minimize risky behaviors.
Penetration Tests
Discover vulnerabilities and mimic attacks to identify exploitable weaknesses.
Types of Pen tests include:
- Black Box Testing: Zero knowledge approach. Ideal starting point.
- Gray Box Testing: Partial knowledge. Transition here after mastering Black Box.
- White Box Testing: Full knowledge. Engage with vendors fully about the environment.
Damage is possible, so tests should explicitly consensual, on isolated systems or scheduled during low-activity periods.