Just how helpful is vulnerability scanning today?
This blog was originally featured as an article in Hospitality Upgrade.
I often hear, “Isn’t vulnerability scanning outdated?” from my clients. After all, with log monitoring and patch updates readily available, they tend to wonder, “What’s the point?”
However, without ongoing vulnerability assessment (VA), the probability of exploits and compromise for a company rises dramatically.
SEE ALSO: Vulnerability Scanners 101: What, Why, and How to Comply
Move beyond the it-can’t-happen-to-me feeling of security and look at the facts: an average of 19 new vulnerabilities are reported per day, according to the National Vulnerability Database.
Most hackers don’t care who you are. They care about your vulnerabilities.
If you look at headlines recently published in the media, it’s easy to see not all attacks are targeted to a specific business.
Many large, popular retailers and companies may not have lost as much sensitive data if they and their third party vendors had been practicing regular VA scanning to discover vulnerabilities within their networks and sites.
SEE ALSO: Perimeter Scan Vs. External Vulnerability Scan
In order to systematically shrink a company’s risk window and prevent a data breach, critical vulnerabilities must be continuously identified, prioritized and remediated across a significant portion of the network.
SEE ALSO: How Long are Businesses Vulnerable Before a Breach?
Here are a few examples of vulnerabilities that your organization’s VA tools should catch (and that your IT team should repair immediately):
- SQL Injection: This attack takes place when an attacker jumps on insecure web application coding and begins to query an organization’s backend database with fervor. The reality is, these issues are quite easy to resolve, yet still widely rampant. Running scans frequently can help to identify this vulnerability quickly.
- Heartbleed: While the media sensation of Heartbleed has finally died down, it was a heavy hitter that existed within OpenSSL 1.0.1 and 1.0.2-beta. Running VA scans would have immediately caught this vulnerability once it had been published.
A correct vulnerability management program takes a wide range of network issues into consideration. It not only identifies weaknesses that may need correction, including misconfigurations and policy noncompliance vulnerabilities that a patch management system alone may not be able to address, but also delivers an across-the-board picture of all systems, services and devices that can potentially breach a network.
Why don’t organizations scan more often?
Due to what was once perceived as a complicated, disruptive process to daily business functions, it’s no secret that VA has caused some huge management headaches over the years.
On top of that, most organizations treat vulnerability management as an occasional and isolated spot check process, largely focused on addressing immediate issues. When a company views VA as a random point-in-time, it is not only a detriment to the industry, but also a practice ineffective at minimizing risks.
Industry best practice is to scan quarterly (at the very minimum) and include a system to speedily remediate discovered weaknesses.
Encourage a top-down approach
It can be challenging for IT departments to gain management support when it comes to enforcing security-related policies and procedures. After all, change can be difficult to implement from middle management up through an organization.
But VA activities must have acceptance from the highest executive levels of an organization in order to be effective. It’s critical that management understands the importance of the assessment to the organization as a whole, and give IT the approval to perform scanning activities.
Keep in mind: The time it takes an IT team to repair and recover from vulnerability exploitation usually has far greater impact on a business than the shorter amount of time it takes to get the organization up to speed on a VA solution.
Once a company has buy-in across the board, it’s important to encourage awareness and training among team members. Typical VA awareness training within a company should include:
- Company-specific goals for utilizing the technology
- An explanation of how a vulnerability scanning appliance operates
- Which departments and systems will be in the assessment scope
- How false positives can be reported to the IT team
- How reports can be used to show details around vulnerabilities
- Where patches can be found and details around the severity levels
Some organizations decide to conduct the scanning process independently, especially with the introduction of scanners that do not require advanced security knowledge to install or implement. When it comes to internal scanning, companies are allowed to use their own product, but to comply with the Payment Card Industry Data Security Standard, they must use an approved scanning vendor for all external VA scans.
Need an approved scanning vendor? Check out our external vulnerability scanner!
Long live vulnerability scanningAs long as hackers and their malware are out there, vulnerability scanning will continue to be a necessary part of everyday security operations. With this simple approach, security holes can be repaired before they become problematic, and companies can proactively fend off attacks before they occur and do serious damage.
Brand Barney (CISSP, HCISPP, QSA) is a Security Analyst at SecurityMetrics, has over 10 years of data security experience, and will totally geek out if you mention Doctor Who. Brand loves to play jazz piano and daydreams about being as great as Dave Brubeck or Thelonious Monk.