Effective Vulnerability Management Managing Risk in the Vulnerable Digital Ecosystem
Autor principal: | |
---|---|
Otros Autores: | |
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated
2024.
|
Edición: | 1st ed |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811315706719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents at a Glance
- Contents
- Foreword
- Introduction
- What Does This Book Cover?
- Who Should Read This Book
- How to Contact the Publisher
- How to Contact the Authors
- Chapter 1 Asset Management
- Physical and Mobile Asset Management
- Consumer IoT Assets
- Software Assets
- Cloud Asset Management
- Multicloud Environments
- Hybrid Cloud Environments
- Third-Party Software and Open Source Software (OSS)
- Third-Party Software (and Risk)
- Accounting for Open Source Software
- On-Premises and Cloud Asset Inventories
- On-Premises Data Centers
- Tooling
- Asset Management Tools
- Vulnerability Scanning Tools
- Cloud Inventory Management Tools
- Ephemeral Assets
- Sources of Truth
- Asset Management Risk
- Log4j
- Missing and Unaccounted-for Assets
- Unknown Unknowns
- Patch Management
- Recommendations for Asset Management
- Asset Manager Responsibilities
- Asset Discovery
- Getting the Right Tooling
- Digital Transformation
- Establishing and Decommissioning Standard Operating Procedures
- Summary
- Chapter 2 Patch Management
- Foundations of Patch Management
- Manual Patch Management
- Risks of Manual Patching
- Manual Patching Tooling
- Automated Patch Management
- Benefits of Automated vs. Manual Patching
- Combination of Manual and Automated Patching
- Risks of Automated Patching
- Patch Management for Development Environments
- Open Source Patching
- Not All Software Is Equal
- Managing OSS Patches Internally
- Responsibilities of Infrastructure vs. Operations Teams
- Who Owns Patch Management?
- Separation of Duties
- Tools and Reporting
- Patching Outdated Systems
- End-of-Life Software
- Unpatched Open Source Software
- Residual Risk
- Common Attacks for Unpatched Systems
- Prioritizing Patching Activities.
- Risk Management and Patching
- Building a Patch Management Program
- People
- Process
- Technology
- Summary
- Chapter 3 Secure Configuration
- Regulations, Frameworks, and Laws
- NSA and CISA Top Ten Cybersecurity Misconfigurations
- Default Configurations of Software and Applications
- Improper Separation of User/Administrator Privilege
- Insufficient Internal Network Monitoring
- Lack of Network Segmentation
- Poor Patch Management
- Bypass of System Access Controls
- Weak or Misconfigured Multifactor Authentication Methods
- Lack of Phishing-Resistant MFA
- Insufficient Access Control Lists on Network Shares and Services
- Poor Credential Hygiene
- Unrestricted Code Execution
- Mitigations
- Default Configurations of Software Applications
- Improper Separation of User/Administration Privilege
- Insufficient Network Monitoring
- Poor Patch Management
- Wrapping up the CIS Misconfigurations Guidance
- CIS Benchmarks
- DISA Security Technical Implementation Guides
- Summary
- Chapter 4 Continuous Vulnerability Management
- CIS Control 7-Continuous Vulnerability Management
- Establish and Maintain a Vulnerability Management Process
- Establish and Maintain a Remediation Process
- Perform Automated Operating System Patch Management
- Perform Automated Application Patch Management
- Perform Automated Vulnerability Scans of Internal Enterprise Assets
- Perform Automated Vulnerability Scans of Externally Exposed Enterprise Assets
- Remediate Detected Vulnerabilities
- Continuous Monitoring Practices
- Summary
- Chapter 5 Vulnerability Scoring and Software Identification
- Common Vulnerability Scoring System
- CVSS 4.0 at a Glance
- Base Metrics
- Exploitability Metrics
- Threat Metrics
- Environmental Metrics
- Supplemental Metrics
- Qualitative Severity Rating Scale
- Vector String.
- Exploit Prediction Scoring System
- EPSS 3.0-Prioritizing Through Prediction
- EPSS 3.0
- Moving Forward
- Stakeholder-Specific Vulnerability Categorization
- CISA SSVC Guide
- Decision Tree Example
- Software Identification Formats
- Common Platform Enumeration
- Package URL
- Software Identification Tags
- Common Weaknesses and Enumerations
- Summary
- Chapter 6 Vulnerability and Exploit Database Management
- National Vulnerability Database (NVD)
- Sonatype Open Source Software Index
- Open Source Vulnerabilities
- GitHub Advisory Database
- Exploit Databases
- Exploit-DB
- Metasploit
- GitHub
- Summary
- Chapter 7 Vulnerability Chaining
- Vulnerability Chaining Attacks
- Exploit Chains
- Daisy Chains
- Vendor-Released Chains
- Microsoft Active Directory
- VMware vRealize Products
- iPhone Exploit Chain
- Vulnerability Chaining and Scoring
- Common Vulnerability Scoring System
- EPSS
- Gaps in the Industry
- Vulnerability Chaining Blindness
- Terminology
- Usage in Vulnerability Management Programs
- The Human Aspect of Vulnerability Chaining
- Phishing
- Business Email Compromise
- Social Engineering
- Integration into VMPs
- Leadership Principles
- Security Practitioner Integration
- IT and Development Usage
- Summary
- Chapter 8 Vulnerability Threat Intelligence
- Why Is Threat Intel Important to VMPs?
- Where to Start
- Technical Threat Intelligence
- Tactical Threat Intelligence
- Strategic Threat Intelligence
- Operational Threat Intelligence
- Threat Hunting
- Integrating Threat Intel into VMPs
- People
- Process
- Technology
- Summary
- Chapter 9 Cloud, DevSecOps, and Software Supply Chain Security
- Cloud Service Models and Shared Responsibility
- Hybrid and Multicloud Environments
- Containers
- Kubernetes
- Serverless
- DevSecOps
- Open Source Software.
- Software-as-a-Service
- Systemic Risks
- Summary
- Chapter 10 The Human Element in Vulnerability Management
- Human Factors Engineering
- Human Factors Security Engineering
- Context Switching
- Vulnerability Dashboards
- Vulnerability Reports
- Cognition and Metacognition
- Vulnerability Cognition
- The Art of Decision-Making
- Decision Fatigue
- Alert Fatigue
- Volume of Vulnerabilities Released
- Required Patches and Configurations
- Vulnerability Management Fatigue
- Mental Workload
- Integration of Human Factors into a VMP
- Start Small
- Consider a Consultant
- Summary
- Chapter 11 Secure-by-Design
- Secure-by-Design/Default
- Secure-by-Design
- Secure-by-Default
- Software Product Security Principles
- Principle 1: Take Ownership of Customer Security Outcomes
- Principle 2: Embrace Radical Transparency and Accountability
- Principle 3: Lead from the Top
- Secure-by-Design Tactics
- Secure-by-Default Tactics
- Hardening vs. Loosening Guides
- Recommendations for Customers
- Threat Modeling
- Secure Software Development
- SSDF Details
- Prepare the Organization (PO)
- Protect Software (PS)
- Produce Well-Secured Software (PW)
- Respond to Vulnerabilities (RV)
- Security Chaos Engineering and Resilience
- Summary
- Chapter 12 Vulnerability Management Maturity Model
- Step 1: Asset Management
- Step 2: Secure Configuration
- Step 3: Continuous Monitoring
- Step 4: Automated Vulnerability Management
- Step 5: Integrating Human Factors
- Step 6: Vulnerability Threat Intelligence
- Summary
- Acknowledgments
- About the Authors
- About the Technical Editor
- Index
- EULA.