Top Banner
Understanding Asset Risk Via Vulnerability Prioritization
27

Understanding Asset Risk Via Vulnerability Prioritization

Aug 17, 2015

Download

Technology

Kenna
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Understanding Asset Risk Via Vulnerability Prioritization

UNDERSTANDING

ASSET RISK VIA

VULNERABILITY PRIORITIZATION

Understanding Asset Risk Via Vulnerability Prioritization

Page 2: Understanding Asset Risk Via Vulnerability Prioritization

LAW 1

SECURITY IS A DATA PROBLEM

Page 3: Understanding Asset Risk Via Vulnerability Prioritization

FLAW 1: DATA FUNDAMENTALISM

Page 4: Understanding Asset Risk Via Vulnerability Prioritization

FLAW 2: STOCHASTIC IGNORANCE

Page 5: Understanding Asset Risk Via Vulnerability Prioritization

ATTACKERS CHANGE TACTICS DAILY

Page 6: Understanding Asset Risk Via Vulnerability Prioritization

DATA-DRIVEN SECURITY

REAL-TIME

Page 7: Understanding Asset Risk Via Vulnerability Prioritization

TODO 1: CORRELATE AND CLEAN

Page 8: Understanding Asset Risk Via Vulnerability Prioritization

TODO 2: FIND GROUND TRUTH1. Breaches

2. Exploits

3. Global Attack

4. Local Attack

5. Zero Days

6. Trends

7. Impact

• Alienvault, Dell, Internal(Snort)

• EDB, MSP, EKITS, Symatec, Internal(Scraper)

• SixScan, ISC, Dell, CarbonBlack, iSight, ThreatStream, PaloAlto, FireEye, Imperva, Norse

• Snort

• iDefense, ExodusIntel

• Internal, Interal(Attack Velocity), BitSight

• DBIR, NetDiligence, Config (Qualys)

Page 9: Understanding Asset Risk Via Vulnerability Prioritization

TODO 3: RELATE TYPES OF RISK

Page 10: Understanding Asset Risk Via Vulnerability Prioritization

“It is a capital mistake to theorize before one has data.

Insensibly, one begins to twist facts to suit theories, instead of theories to suit facts.”

Page 11: Understanding Asset Risk Via Vulnerability Prioritization

I Love It When You Call Me Big Data150,000,000 Live Vulnerabilities

1,500,000 Assets

2,000 Organizations

Page 12: Understanding Asset Risk Via Vulnerability Prioritization

I Love It When You Call Me Big Data

200,000,000 BREACHES

Page 13: Understanding Asset Risk Via Vulnerability Prioritization

Baseline AllthethingsProbability (You Will Be Breached On A Particular Open Vulnerability)?

=(Open Vulnerabilities | Breaches Occurred On Their CVE) /(Total Open Vulnerabilities)

6%

Page 14: Understanding Asset Risk Via Vulnerability Prioritization

Probability A Vuln Having Property X Has Observed Breaches

0 2 4 6 8 10 12

0

1

2

3

4

5

6

7

8

9

10

Breach1Probability1(%)

CVSS1Base

Page 15: Understanding Asset Risk Via Vulnerability Prioritization

Probability A Vuln Having Property X Has Observed Breaches

0 5 10 15 20 25 30 35 40

CVSS*10

EDB

MSP

EDB+MSP

Breach*Probability*(%)

Page 16: Understanding Asset Risk Via Vulnerability Prioritization

Not So Secret Sauce

CVSS$Base Normalize$Base$Score Metasploit? ExploitDB?

Exploit$Source$3,4,5,6...N?

Active$Breach$Velocity

Asset$Internal/External?

Vulnerability$Trending?

Zero$Days? Risk$Meter$Score

Page 17: Understanding Asset Risk Via Vulnerability Prioritization

0

5

10

15

20

25

30

35

40

0 1 2 3 4 5 6 7 8 9 10

Positive2Predictive2Value

Score

Positive2Predictive2Value2as2a2Function2of2Score2Cutoff

CVSS2Base

CVSS2Temporal

Risk2Meter

Page 18: Understanding Asset Risk Via Vulnerability Prioritization
Page 19: Understanding Asset Risk Via Vulnerability Prioritization

NORMAL DISTRIBUTIONS RULE EVERYTHING AROUND ME

Page 20: Understanding Asset Risk Via Vulnerability Prioritization

BREACH SIZE BY RECORDS LOST

P(Breach involves X records) = X^-1.31

Page 21: Understanding Asset Risk Via Vulnerability Prioritization

BREACH FREQUENCY BY CVE TYPE

P(CVE has breach volume X) = X^-1.5

Page 22: Understanding Asset Risk Via Vulnerability Prioritization

DEALING WITH FAT TAILS

Page 23: Understanding Asset Risk Via Vulnerability Prioritization

ASSET RISK MODEL

Page 24: Understanding Asset Risk Via Vulnerability Prioritization
Page 25: Understanding Asset Risk Via Vulnerability Prioritization
Page 26: Understanding Asset Risk Via Vulnerability Prioritization

APPLES TO APPLES, RISKS TO RISKS

Page 27: Understanding Asset Risk Via Vulnerability Prioritization

MODEL DATA

ASSET RISK QUESTIONS:

VULN PRIORITY QUESTIONS:

How do we model risk?

Does topology matter?

How good is our current model?

What data do we need about exploits? What data do we need about live vulns?

How good is your asset inventory?