当前位置:网站首页>How to do well in enterprise system vulnerability assessment
How to do well in enterprise system vulnerability assessment
2022-07-27 14:48:00 【ManageEngine Zhuohao】

As an overall plan IT Administrators , Are you always paying attention to the server 、 Workstations and staff computers 、 Notebook system security ? Are you always paying attention to the new security events and system vulnerability information on the Internet ? In daily work, I have been defending against network attacks and repairing system vulnerabilities , But I am worried about the security loopholes that appear at any time , This is because there is no effective and systematic way to find and repair vulnerabilities .
IT Administrators should keep abreast of the latest system dynamics , Find the focus of attention to system vulnerabilities , Complete safety management tasks in a timely and efficient manner .
What is vulnerability assessment
Vulnerability assessment , Or more accurately, vulnerability analysis , It is to identify according to the risks that security risks bring to your enterprise , The process of evaluation and classification , So that you can accurately handle security issues , Reduce risks in time . Vulnerability assessment is an active means for system security , You can find those vulnerabilities that are more likely to be exploited , In this way, the most serious loopholes can be quickly repaired , So as not to cause loss .
Why do you need a vulnerability assessment tool
According to the latest Forrester Global Security Survey ,“ In the past year , Yes 49% Of enterprises have suffered one or more attacks , And software vulnerability is the biggest factor causing these damages .” In recent years , System vulnerabilities are proliferating . Tens of thousands of security vulnerabilities are discovered every year , This highlights the importance of vulnerability assessment of enterprises .
The reality is cruel , No security team has the resources or time to manually address each vulnerability . Even if you intend to do so , We should also solve the most serious problems first . Because not all vulnerabilities pose the same threat to the enterprise . You need a vulnerability assessment tool that can provide the required vulnerability background information , Learn about possible and unexploited vulnerabilities , In this way, you can solve emergency vulnerabilities first .
How to evaluate security vulnerabilities
Most vulnerability assessment tools provide common indicators , Such as severity rating and general vulnerability scoring system (CVSS) Level to assess security vulnerabilities . however , We should really understand the risks brought by vulnerabilities , You need to master the following list based on these indicators :
- Whether the vulnerability has been publicly disclosed
- How long has this vulnerability been latent in your terminal
- How easy is it to exploit this vulnerability
- Whether the manufacturer has released a patch for this vulnerability
- Whether you can extract meaningful processing from the scanned data
- If there is no patch , Do you have a temporary fix
therefore , It's not just scanning for vulnerabilities , We should also be able to conduct vulnerability assessment , Be able to master all the information in the above list .
Vulnerability assessment tools
Vulnerability Manager Plus The design principle of vulnerability management is :“ Pinpoint , prioritizing , Fix vulnerability ”.
Vulnerability assessment steps 
Eliminate blind spots
Eliminating blind spots is the key to effectively evaluate vulnerabilities . Automatically discover assets in active directories and workgroup assets . Once new assets are added to the network , Will be discovered .
Continuous monitoring
When performing a manual or scheduled vulnerability scan , You may not be able to take measures in time . Whenever a new device or software enters your network , Your enterprise will face new vulnerabilities . You need to continuously monitor and identify vulnerabilities . Use agent-based scanning , Every time 90 Check the terminal for new vulnerabilities every minute .
Vulnerability assessment dashboard
The vulnerability dashboard is IT Administrators provide a clear view , Let you focus on the most worrying place .
Vulnerability severity summary 
Don't ignore the importance of severity level ; They are common vulnerability risk assessment criteria . Vulnerability severity summary helps you track the number of vulnerabilities at each severity level that need to be addressed , So as to better see how many key vulnerabilities remain .
Zero Day vulnerability 
Security vulnerability assessment One of the most critical aspects of is how the vulnerability assessment tool effectively enables you to understand Zero Day vulnerabilities . Zero Day vulnerability is the easiest target for hackers , Because before suppliers can release patches to fix vulnerabilities , Zero Day vulnerability has been known to the public or exploited by the opposition , Therefore, it is crucial to ensure that they are not buried by trivia .Vulnerability Manager Plus And the zero day count chart provides you with a view of zero day vulnerabilities in the network , So you can recognize them immediately , And repair it or use alternative mitigation measures , While waiting for the patch from the server vendor .
Vulnerability time matrix 
Speaking of vulnerability repair , Time is very important . In recent years , The time from vulnerability release to vulnerability exploitation code disclosure is greatly shortened . The longer you wait , The longer the network is attacked .
Critical vulnerabilities can often be exploited automatically without any user interaction , Therefore, these loopholes must be solved immediately , Important loopholes should be 30 Repair within days , Low level vulnerabilities should be 90 Repair within days .
High priority vulnerability
This is what you should focus on ! Manage the list of vulnerabilities that are on the verge of being exploited . The list considers various risk factors , For example, the difficulty of vulnerability exploitation , severity , Time and patch availability . This form can help you ensure that no key factors are missed in the vulnerability assessment process .
Bug repair
By automatically associating vulnerabilities with their patches , You can immediately deploy patches to priority vulnerabilities . A separate patch management module is also provided , Used to set the regular patch plan . For zero day vulnerabilities , Provides a temporary solution .
边栏推荐
- Carla notes (04) - client and world (create client, connect world, batch object, set weather, set lights, world snapshots)
- Annual comprehensive analysis of China's online video market in 2022
- @Bean 与 @Component 用在同一个类上,会发生什么?
- mysql保存数据提示:Out of range value for column错误
- 视觉系统设计实例(halcon-winform)-10.PLC通讯
- 终于有人把面试必考的动态规划、链表、二叉树、字符串全部撸完了
- Forward proxy and reverse proxy
- 进程间通信
- Document translation__ Tvreg V2: variational imaging method for denoising, deconvolution, repair and segmentation (part)
- MySQL advanced II. Logical architecture analysis
猜你喜欢

Rtl8762dk environment construction (I)

PROFINET 模拟器使用教程

codeforces 1708E - DFS Trees

Understand JS execution context in an article

RTL8762DK 环境搭建(一)

MySQL advanced II. Logical architecture analysis

股票买卖4

Summary of basic knowledge of C language

视觉系统设计实例(halcon-winform)-10.PLC通讯

Research on multi label patent classification based on pre training model
随机推荐
Advanced MySQL III. storage engine
股票买卖4
Document translation__ Salt and pepper image denoising based on adaptive total variation L1 regularization
Redis
Interprocess communication
Carla notes (04) - client and world (create client, connect world, batch object, set weather, set lights, world snapshots)
Docker practical experience: deploy mysql8 master-slave replication on docker
巨形象的图解 SQL
Import the virtual machine officially made by Kali Linux into Oracle VirtualBox
codeforces 1708E - DFS Trees
poj3461 Oulipo【KMP】
Arduino+ze08-ch2o formaldehyde module, output formaldehyde content
mysql保存数据提示:Out of range value for column错误
Rtl8762dk environment construction (I)
终于有人把面试必考的动态规划、链表、二叉树、字符串全部撸完了
log4j2 jdbc appender
【论文精读】Grounded Language-Image Pre-training(GLIP)
腾讯二面:@Bean 与 @Component 用在同一个类上,会怎么样?
Understand JS execution context in an article
Graphic SQL of giant image