Threat Level: green Handler on Duty: Russell Eubanks

SANS ISC: Internet Storm Center - SANS Internet Storm Center Internet Storm Center


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Latest Diaries

ISC Stormcast For Friday, June 24th 2016 http://isc.sans.edu/podcastdetail.html?id=5055

An Approach to Vulnerability Management

Published: 2016-06-23
Last Updated: 2016-06-23 23:44:25 UTC
by Russell Eubanks (Version: 1)
12 comment(s)

No need to do anything to make your auditor happy than to purchase the most popular scanning tool
 
No need to worry, when the scan is over and the report has been produced - you are all done
 
No need to ever leave your cube and speak directly with your system administrators
 
No need to ever test the scanner on a non-production network in advance
 
No need to worry, a clean scan means you are both compliant and secure
 
No need to ever leave your cube and speak directly with your application developers
 
No need to ever let anyone know when your scan starts, after all an attacker is not going to do that so why should you
 
No need to worry, if something becomes unavailable during a scan it is totally not your problem
 
 
No need to show good stewardship after the purchase by producing metrics such as the percentage of findings that have been fixed as a percentage of all the findings
 
No need to seek data that demonstrates your scanner could serve as a platform to improve your security posture
 
No need to keep your boss informed of your progress, s/he would not understand 
 
No need to divert any of your time from finding things to fixing things
 
No need to ever think that your scanning tool is every anything but spot on accurate
 
No need to hold back, it would be great if you shared your Vulnerability Management “best practices" in our comments section below
 
 
Russell Eubanks
12 comment(s)
ISC Stormcast For Thursday, June 23rd 2016 http://isc.sans.edu/podcastdetail.html?id=5053

If you have more information or corrections regarding our diary, please share.

Recent Diaries

Security through obscurity never works
3 days ago by Bojan (0 comments)

LogMeIn Captain! A "Not so Phishy" Phishing Campaign
4 days ago by Rob VandenBrink (2 comments)

Ongoing Spam Campaign Related to Swift
5 days ago by Xme (4 comments)

Using Your Password Manager to Monitor Data Leaks
5 days ago by Xme (3 comments)

Controlling JavaScript Malware Before it Runs
1 week ago by Rob VandenBrink (5 comments)

View All Diaries →

Latest Discussions

Tracking EoL Software
created 1 day ago by SaltedSecurity (1 reply)

Past Data in TSV File from Feed
created 2 weeks ago by Palladion (1 reply)

Updating network object in ASA thru API
created 2 weeks ago by Krypt0ni8 (6 replies)

hailataxii.com
created 2 weeks ago by Anonymous (0 replies)

Google's No Password feature - Security Sucks these days
created 2 weeks ago by Anonymous (1 reply)

View All Forums →

Latest News

View All News →

Top Diaries

Critical Cisco ASA IKEv1/v2 Vulnerability. Active Scanning Detected
4 months ago by Dr. J. (24 comments)

An Approach to Vulnerability Management
1 day ago by Russell (12 comments)

Microsoft Patch Tuesday Summary for May 2016
1 month ago by Alex Stanford (5 comments)

Controlling JavaScript Malware Before it Runs
1 week ago by Rob VandenBrink (5 comments)

CVE-2015-7547: Critical Vulnerability in glibc getaddrinfo
4 months ago by Dr. J. (9 comments)