Effective Vulnerability Management Managing Risk in the Vulnerable Digital Ecosystem

Detalles Bibliográficos
Autor principal: Hughes, Chris (-)
Otros Autores: Robinson, Nikki
Formato: Libro electrónico
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated 2024.
Edición:1st ed
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811315706719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents at a Glance
  • Contents
  • Foreword
  • Introduction
  • What Does This Book Cover?
  • Who Should Read This Book
  • How to Contact the Publisher
  • How to Contact the Authors
  • Chapter 1 Asset Management
  • Physical and Mobile Asset Management
  • Consumer IoT Assets
  • Software Assets
  • Cloud Asset Management
  • Multicloud Environments
  • Hybrid Cloud Environments
  • Third-Party Software and Open Source Software (OSS)
  • Third-Party Software (and Risk)
  • Accounting for Open Source Software
  • On-Premises and Cloud Asset Inventories
  • On-Premises Data Centers
  • Tooling
  • Asset Management Tools
  • Vulnerability Scanning Tools
  • Cloud Inventory Management Tools
  • Ephemeral Assets
  • Sources of Truth
  • Asset Management Risk
  • Log4j
  • Missing and Unaccounted-for Assets
  • Unknown Unknowns
  • Patch Management
  • Recommendations for Asset Management
  • Asset Manager Responsibilities
  • Asset Discovery
  • Getting the Right Tooling
  • Digital Transformation
  • Establishing and Decommissioning Standard Operating Procedures
  • Summary
  • Chapter 2 Patch Management
  • Foundations of Patch Management
  • Manual Patch Management
  • Risks of Manual Patching
  • Manual Patching Tooling
  • Automated Patch Management
  • Benefits of Automated vs. Manual Patching
  • Combination of Manual and Automated Patching
  • Risks of Automated Patching
  • Patch Management for Development Environments
  • Open Source Patching
  • Not All Software Is Equal
  • Managing OSS Patches Internally
  • Responsibilities of Infrastructure vs. Operations Teams
  • Who Owns Patch Management?
  • Separation of Duties
  • Tools and Reporting
  • Patching Outdated Systems
  • End-of-Life Software
  • Unpatched Open Source Software
  • Residual Risk
  • Common Attacks for Unpatched Systems
  • Prioritizing Patching Activities.
  • Risk Management and Patching
  • Building a Patch Management Program
  • People
  • Process
  • Technology
  • Summary
  • Chapter 3 Secure Configuration
  • Regulations, Frameworks, and Laws
  • NSA and CISA Top Ten Cybersecurity Misconfigurations
  • Default Configurations of Software and Applications
  • Improper Separation of User/Administrator Privilege
  • Insufficient Internal Network Monitoring
  • Lack of Network Segmentation
  • Poor Patch Management
  • Bypass of System Access Controls
  • Weak or Misconfigured Multifactor Authentication Methods
  • Lack of Phishing-Resistant MFA
  • Insufficient Access Control Lists on Network Shares and Services
  • Poor Credential Hygiene
  • Unrestricted Code Execution
  • Mitigations
  • Default Configurations of Software Applications
  • Improper Separation of User/Administration Privilege
  • Insufficient Network Monitoring
  • Poor Patch Management
  • Wrapping up the CIS Misconfigurations Guidance
  • CIS Benchmarks
  • DISA Security Technical Implementation Guides
  • Summary
  • Chapter 4 Continuous Vulnerability Management
  • CIS Control 7-Continuous Vulnerability Management
  • Establish and Maintain a Vulnerability Management Process
  • Establish and Maintain a Remediation Process
  • Perform Automated Operating System Patch Management
  • Perform Automated Application Patch Management
  • Perform Automated Vulnerability Scans of Internal Enterprise Assets
  • Perform Automated Vulnerability Scans of Externally Exposed Enterprise Assets
  • Remediate Detected Vulnerabilities
  • Continuous Monitoring Practices
  • Summary
  • Chapter 5 Vulnerability Scoring and Software Identification
  • Common Vulnerability Scoring System
  • CVSS 4.0 at a Glance
  • Base Metrics
  • Exploitability Metrics
  • Threat Metrics
  • Environmental Metrics
  • Supplemental Metrics
  • Qualitative Severity Rating Scale
  • Vector String.
  • Exploit Prediction Scoring System
  • EPSS 3.0-Prioritizing Through Prediction
  • EPSS 3.0
  • Moving Forward
  • Stakeholder-Specific Vulnerability Categorization
  • CISA SSVC Guide
  • Decision Tree Example
  • Software Identification Formats
  • Common Platform Enumeration
  • Package URL
  • Software Identification Tags
  • Common Weaknesses and Enumerations
  • Summary
  • Chapter 6 Vulnerability and Exploit Database Management
  • National Vulnerability Database (NVD)
  • Sonatype Open Source Software Index
  • Open Source Vulnerabilities
  • GitHub Advisory Database
  • Exploit Databases
  • Exploit-DB
  • Metasploit
  • GitHub
  • Summary
  • Chapter 7 Vulnerability Chaining
  • Vulnerability Chaining Attacks
  • Exploit Chains
  • Daisy Chains
  • Vendor-Released Chains
  • Microsoft Active Directory
  • VMware vRealize Products
  • iPhone Exploit Chain
  • Vulnerability Chaining and Scoring
  • Common Vulnerability Scoring System
  • EPSS
  • Gaps in the Industry
  • Vulnerability Chaining Blindness
  • Terminology
  • Usage in Vulnerability Management Programs
  • The Human Aspect of Vulnerability Chaining
  • Phishing
  • Business Email Compromise
  • Social Engineering
  • Integration into VMPs
  • Leadership Principles
  • Security Practitioner Integration
  • IT and Development Usage
  • Summary
  • Chapter 8 Vulnerability Threat Intelligence
  • Why Is Threat Intel Important to VMPs?
  • Where to Start
  • Technical Threat Intelligence
  • Tactical Threat Intelligence
  • Strategic Threat Intelligence
  • Operational Threat Intelligence
  • Threat Hunting
  • Integrating Threat Intel into VMPs
  • People
  • Process
  • Technology
  • Summary
  • Chapter 9 Cloud, DevSecOps, and Software Supply Chain Security
  • Cloud Service Models and Shared Responsibility
  • Hybrid and Multicloud Environments
  • Containers
  • Kubernetes
  • Serverless
  • DevSecOps
  • Open Source Software.
  • Software-as-a-Service
  • Systemic Risks
  • Summary
  • Chapter 10 The Human Element in Vulnerability Management
  • Human Factors Engineering
  • Human Factors Security Engineering
  • Context Switching
  • Vulnerability Dashboards
  • Vulnerability Reports
  • Cognition and Metacognition
  • Vulnerability Cognition
  • The Art of Decision-Making
  • Decision Fatigue
  • Alert Fatigue
  • Volume of Vulnerabilities Released
  • Required Patches and Configurations
  • Vulnerability Management Fatigue
  • Mental Workload
  • Integration of Human Factors into a VMP
  • Start Small
  • Consider a Consultant
  • Summary
  • Chapter 11 Secure-by-Design
  • Secure-by-Design/Default
  • Secure-by-Design
  • Secure-by-Default
  • Software Product Security Principles
  • Principle 1: Take Ownership of Customer Security Outcomes
  • Principle 2: Embrace Radical Transparency and Accountability
  • Principle 3: Lead from the Top
  • Secure-by-Design Tactics
  • Secure-by-Default Tactics
  • Hardening vs. Loosening Guides
  • Recommendations for Customers
  • Threat Modeling
  • Secure Software Development
  • SSDF Details
  • Prepare the Organization (PO)
  • Protect Software (PS)
  • Produce Well-Secured Software (PW)
  • Respond to Vulnerabilities (RV)
  • Security Chaos Engineering and Resilience
  • Summary
  • Chapter 12 Vulnerability Management Maturity Model
  • Step 1: Asset Management
  • Step 2: Secure Configuration
  • Step 3: Continuous Monitoring
  • Step 4: Automated Vulnerability Management
  • Step 5: Integrating Human Factors
  • Step 6: Vulnerability Threat Intelligence
  • Summary
  • Acknowledgments
  • About the Authors
  • About the Technical Editor
  • Index
  • EULA.