0% found this document useful (0 votes)
43 views

Health-IsAC Risk-Based Approach To Vulnerability Prioritization (En)

The focus of the paper is to advocate for a more nuanced and risk-based approach to the Sisyphean task of vulnerability management. In a world where the number of vulnerabilities is so high that it could give anyone trying to patch them all a Sysadmin version of a nervous breakdown, the paper wryly suggests that maybe, just maybe, we should focus on the ones that bad actors are exploiting in the wild. The document acknowledges the absurdity of the traditional "patch everything yesterday" approac

Uploaded by

Snarky Security
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Health-IsAC Risk-Based Approach To Vulnerability Prioritization (En)

The focus of the paper is to advocate for a more nuanced and risk-based approach to the Sisyphean task of vulnerability management. In a world where the number of vulnerabilities is so high that it could give anyone trying to patch them all a Sysadmin version of a nervous breakdown, the paper wryly suggests that maybe, just maybe, we should focus on the ones that bad actors are exploiting in the wild. The document acknowledges the absurdity of the traditional "patch everything yesterday" approac

Uploaded by

Snarky Security
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Read more: Boosty

System) and SSVC (Stakeholder-Specific Vulnerability


Categorization)
• Practical Guidance: The document offers practical
guidance on how to implement these methods and tools,
making it easier for organizations to adopt these
practices
B. Drawbacks
• Resource Intensive: Implementing the methods and
tools suggested in the document can be resource-
intensive, requiring significant time, effort, and
expertise
• Complexity: The document's approach is complex and
may be challenging for smaller organizations or those
with less mature security teams to implement
C. Limitations
• Dependent on Accurate Data: The effectiveness of the
methods and tools suggested in the document is
dependent on the availability and accuracy of data. For
instance, asset value prioritization requires an accurate
and agreed-upon business impact value per company
asset
• Dynamic Threat Landscape: The document's
approach may not account for the dynamic nature of the
I. INTRODUCTION threat landscape. New vulnerabilities and threats
The document titled "Health-ISAC: Risk-Based Approach to emerge constantly, which may require adjustments to
Vulnerability Prioritization" discusses the importance of the prioritization framework
prioritizing vulnerabilities in cybersecurity management. With • Human Element: While the document suggests
over 15,000 vulnerabilities identified in 2023 and 25,227 in methods to eliminate the human element from
prioritization, human judgment is still crucial in many
2022, organizations are overwhelmed by the volume of findings
aspects of vulnerability management. For instance,
and the challenging task of triaging vulnerabilities to determine determining the effectiveness of compensating controls
which to address first. or interpreting the results of tools like EPSS and SSVC
The paper emphasizes the need for maturing vulnerability requires human expertise
management processes and a shift away from traditional severity • Reliance on CVSS Scoring: The document discusses
ratings. It suggests that organizations should implement the use of Common Vulnerability Scoring System
sustainable frameworks and standards for prioritization in (CVSS) as a baseline for vulnerability management.
vulnerability management. While CVSS is a widely accepted standard, it has been
criticized for not accurately reflecting the real-world
This document is set to be meticulously analyzed, with a risk of vulnerabilities. The document acknowledges
focus on the multifaceted aspects of vulnerability management this and suggests using additional tools like the Exploit
within the healthcare sector. The analysis will delve into the Prediction Scoring System (EPSS) and Stakeholder-
strategies and frameworks recommended for effectively Specific Vulnerability Categorization (SSVC), but the
reliance on CVSS could still be seen as a limitation
prioritizing vulnerabilities.
• Lack of Practical Examples: While the document
The document provides a comprehensive and practical provides a comprehensive theoretical framework for
guide to vulnerability prioritization. While it has some vulnerability prioritization, it could benefit from more
drawbacks and limitations, it can be a valuable resource for practical examples or case studies to illustrate how
organizations looking to improve their vulnerability these concepts can be applied in real-world scenarios
management processes.
II. KEY CONCEPTS
A. Benefits
Risk-based approach covers several key concepts:
• Risk-Based Approach: a risk-based approach to • Using Base CVSS Scoring: The Common
vulnerability management can help organizations focus Vulnerability Scoring System (CVSS) is a standard
on the most critical vulnerabilities that pose the greatest used to rate the severity and exploitability of
threat vulnerabilities. However, only 2-7% of all published
• Comprehensive Framework: a comprehensive vulnerabilities are ever exploited in the wild, often due
framework includes various methods such as Base to a lack of prioritization
CVSS Scoring, focusing on known exploited • Focusing on Known Exploited Vulnerabilities: The
vulnerabilities, considering device context or paper suggests a more risk-based approach, focusing
placement, asset value, compensating controls, and on known exploited vulnerabilities. The Cybersecurity
using tools like EPSS (Exploit Prediction Scoring and Infrastructure Security Agency (CISA) has
Read more: Boosty
released a list of Known Exploit Vulnerabilities The Common Vulnerability Scoring System (CVSS) is a
(KEV) to help organizations prioritize their framework used to rate the severity of security vulnerabilities.
remediation efforts It uses three groups of metrics to calculate scores: Base,
• Device Context or Placement: The network location Temporal, and Environmental
of a device is a critical factor in vulnerability • Base Metrics: These metrics produce a score ranging
prioritization. Internet-facing vulnerabilities and from 0 to 10, which reflects the inherent characteristics
misconfigurations should always be a priority, while of a vulnerability that are constant over time and across
internally-facing assets should fall under an internal user environments. They are divided into two groups:
service level agreement (SLA) remediation timeline Exploitability Metrics (such as Attack Vector, Attack
• Asset Value: The value of an asset is another Complexity, Privileges Required, and User Interaction)
important factor in vulnerability prioritization. and Impact Metrics (which measure the impact on
Analysts must know the asset's value as they leverage Confidentiality, Integrity, and Availability)
device context and placement • Temporal Metrics: These metrics reflect the
• Compensating Controls: Most organizations have characteristics of a vulnerability that may change over
layered security controls or defense-in-depth strategies time but not among user environments. They include
to mitigate attacks. These security controls should Exploit Code Maturity, Remediation Level, and Report
make it more difficult to exploit vulnerabilities Confidence. Temporal metrics are optional and used to
• EPSS – Exploit Prediction Scoring System: EPSS is produce a temporal score, which is a modification of the
a machine-learning model that predicts the likelihood Base score
or probability that a vulnerability will be exploited in • Environmental Metrics: These metrics enable the user
the wild. It helps defenders prioritize vulnerability to customize the CVSS score depending on the
remediation efforts more effectively importance of the affected software, hardware, or data
• SSVC – Stakeholder-Specific Vulnerability in their environment. They include Collateral Damage
Categorization: SSVC focuses on values, including Potential, Target Distribution, Confidentiality
the security flaw's exploitation status, its impact on Requirement, Integrity Requirement, and Availability
safety, and the prevalence of the affected products. It Requirement. Like Temporal metrics, Environmental
improves vulnerability management processes and metrics are optional and used to produce an
accounts for diverse stakeholders environmental score, which is a further modification of
the Temporal score
III. USING BASE CVSS SCORING
The CVSS Base score differs from the Temporal and
It discusses the use of the Common Vulnerability Scoring Environmental scores in that it only considers the inherent,
System (CVSS) as a baseline for vulnerability management, unchanging characteristics of the vulnerability. In contrast, the
particularly for organizations with smaller security teams or Temporal score takes into account factors that change over
those in the early stages of developing a vulnerability time, such as whether an exploit has been developed or a patch
management program is available. The Environmental score allows for customization
• Base CVSS Scoring as a Starting Point: For based on the importance of the affected assets in a specific
organizations with limited resources or those just user's environment. Therefore, while the Base score is the same
starting their vulnerability management program, using for all users, the Temporal and Environmental scores can vary
the base CVSS scoring to prioritize and remediate all
depending on the time and the specific user environment.
critical and high severity vulnerabilities can be a good
starting point. This approach eliminates the need for The Base, Temporal, and Environmental metrics impact
human judgment in prioritizing vulnerabilities, which each other in the sense that the Temporal Score is a
can be beneficial for smaller teams or those with modification of the Base Score, and the Environmental Score is
multiple responsibilities a modification of the Temporal Score. This means that changes
• Limitations of Base CVSS Scoring: While using base in the Base metrics will affect the Temporal and Environmental
CVSS scoring can be a good starting point, it has its scores, and changes in the Temporal metrics will affect the
limitations. For instance, remediation teams may be Environmental score. However, changes in the Environmental
overwhelmed by the sheer number of vulnerabilities metrics do not affect the other scores, as it is specific to the
they are asked to focus on. Additionally, threat actors user's environment.
may not always exploit the highest severity
vulnerabilities and instead chain together multiple The Common Vulnerability Scoring System (CVSS) base
exploits of less severe vulnerabilities to gain access to score typically does not change over time. It is a static score that
systems represents the severity of a vulnerability based on the
• Need for a More Risk-Based Approach: Given the characteristics of the vulnerability itself, such as its impact and
limitations of using base CVSS scoring alone suggests exploitability. However, the interpretation and application of
a more risk-based approach that focuses on known the CVSS score can change over time based on various factors.
exploited vulnerabilities. This approach significantly For instance, the CVSS score might be used differently in
reduces the number of vulnerabilities that need the context of an organization's vulnerability management
immediate attention and ensures practitioners focus on process. An organization might prioritize vulnerabilities not
vulnerabilities that pose the greatest threat to just based on their CVSS scores, but also on factors such as
organizations
whether the vulnerability is being actively exploited, the value
of the assets that could be affected, the presence of
Read more: Boosty
compensating controls, and the context of the device where the limited resources. Focusing on known exploited
vulnerability exists. vulnerabilities allows organizations to prioritize their
Moreover, tools like the Exploit Prediction Scoring System efforts and resources on the vulnerabilities that pose the
(EPSS) and the Stakeholder-Specific Vulnerability most significant threat
Categorization (SSVC) can be used to supplement the CVSS • Risk Reduction: Known exploited vulnerabilities are
those that have been used by attackers in the wild. By
score. EPSS uses a machine-learning model to predict the prioritizing these vulnerabilities, organizations can
likelihood that a vulnerability will be exploited in the wild, significantly reduce their risk exposure. For instance, a
providing a dynamic perspective on the risk posed by the study found that less than 4% of all known
vulnerability. SSVC, on the other hand, focuses on values vulnerabilities have been used by attackers in the wild
including the security flaw's exploitation status, its impact on • Effective Mitigation and Remediation Strategies:
safety, and the prevalence of the affected products, allowing for Prioritizing known exploited vulnerabilities supports
a more customized and dynamic approach to vulnerability the development of effective mitigation and
management. remediation strategies. It helps security teams
communicate effectively with stakeholders, identify
IV. FOCUSING ON KNOWN EXPLOITED VULNERABILITIES asset value, and develop remediation policies
conducive to the continuity of business-critical systems
It emphasizes the importance of prioritizing known • Regulatory Compliance: Regulatory bodies like the
exploited vulnerabilities in cybersecurity risk management. Cybersecurity and Infrastructure Security Agency
• Known Exploited Vulnerabilities: The report (CISA) have directives focusing on reducing the risk of
suggests a risk-based approach that focuses on known known exploited vulnerabilities. Compliance with these
exploited vulnerabilities. It cites the Binding directives is another reason to prioritize known
Operational Directive 22-01 released by CISA, which exploited vulnerabilities
aims to reduce the risk of known exploited • Threat-Based Prioritization: Focusing on known
vulnerabilities. The directive emphasizes that less than exploited vulnerabilities allows for a more threat-based
4% of all known vulnerabilities have been used by approach to vulnerability management. This approach
attackers in the wild, so focusing on these ensures that practitioners focus on vulnerabilities that
vulnerabilities can significantly reduce the number of pose the greatest threat to organizations
vulnerabilities that need immediate attention • Asset Protection: Prioritizing known exploited
• Prioritization: The report suggests that known vulnerabilities helps protect valuable assets. If a device
exploited vulnerabilities should be the top priority for that is of utmost importance to the operation of the
remediation. This approach ensures that practitioners business or holds critical information were to be
focus on vulnerabilities that pose the greatest threat to compromised, it could be catastrophic to the
organizations. A process that keeps an organization safe organization
would likely include focusing on CISA's Known
Exploited Vulnerabilities (KEV) list and pivoting to V. DEVICE CONTEXT OR PLACEMENT
remediate non-exploited vulnerabilities with critical
and high severity levels The network location of devices is significant in the process
• Reduced Number of Vulnerabilities: This of vulnerability prioritization.
methodology significantly reduces the number of • Criticality of Network Location: This knowledge is
vulnerabilities that need immediate attention. As of July crucial for prioritizing vulnerabilities, especially when
13, 2023, there were less than 1,000 vulnerabilities on new CVEs and zero-days are disclosed for internet-
the list. It also ensures practitioners focus on facing assets
vulnerabilities that pose the greatest threat to • Prioritization of Internet-Facing Vulnerabilities:
organizations Vulnerabilities and misconfigurations on internet-
• Compliance Obligations: The report also notes that facing devices should be prioritized because they are
while the directive helps agencies prioritize their more accessible to threat actors and can serve as an easy
remediation work, it does not release them from any entry point for attacks. These vulnerabilities pose a
compliance obligations, including resolving other higher risk of compromise and should be addressed
vulnerabilities promptly
• CVSS Scoring: The report acknowledges that CVSS • Internal SLA Remediation Timeline: For systems
scoring can still be a part of an organization's that are not accessible from the internet, such as
vulnerability management efforts, especially with internally facing assets, should fall under an internal
machine-to-machine communication and large-scale service level agreement (SLA) remediation timeline.
automation This implies that different SLAs should be established
Focusing on known exploited vulnerabilities is a critical based on the network location of the assets, with
aspect of vulnerability management. It allows organizations to internet-facing assets having shorter SLAs than
internally-facing ones
efficiently allocate resources, reduce risk, develop effective
• Lateral Movement Considerations: When
strategies, comply with regulations, prioritize based on threats, prioritizing internal vulnerabilities, the focus should be
and protect valuable assets: on preventing lateral movement within the network.
• Efficient Resource Allocation: With thousands of Prioritization should be given to vulnerabilities that
vulnerabilities identified each year, organizations often could allow an attacker to gain control of a system or
struggle to manage and remediate all of them due to move laterally to access sensitive data
Read more: Boosty
• Use of Vulnerability Priority Ratings: most business impact into severity weighting provides a
vulnerability management tools today incorporate more accurate view of risk to the company
additional scoring features, such as the Exploit • Configuration Management Database (CMDB): To
Prediction Scoring System (EPSS), to assist analysts in effectively implement this strategy, an accurate and
prioritizing vulnerabilities. These tools provide agreed-upon business impact value per company asset
vulnerability priority ratings that help determine which is needed. Ideally, this information should be centrally
security flaws should be remediated first based on the located, such as in a Configuration Management
likelihood of exploitation within the network Database (CMDB). Although most industry CMDB
• Risk-Based Approach: By incorporating the context products provide an asset discovery solution to help
of device location, organizations can operate in a maintain inventory accuracy, it will only be partially
manner that aligns with a risk-based approach to absolved of challenges
vulnerability management. This approach ensures that In vulnerability management, asset value refers to the
patching teams focus on remediating vulnerabilities importance of a particular asset (such as a device, system, or
based on their attack vector, exploitability, and severity data) to an organization's operations or business continuity. It is
In the context of vulnerability management, "device context a critical factor in vulnerability prioritization, helping security
or placement" refers to the network location and role of devices, teams decide which vulnerabilities to address first based on the
which is a critical factor in prioritizing vulnerabilities. The potential impact on the organization's most valuable assets
placement of a device can significantly affect the risk level of a The calculation of asset value in vulnerability management
vulnerability and therefore influence the prioritization for
is not a straightforward process and can vary depending on the
remediation efforts.
organization's specific context and needs. It often involves
A. Examples of Device Context or Placement in Vulnerability assessing the asset's role in the organization, the sensitivity of
Management the data it holds, its importance to business operations, and the
• Emerging Threat Response: Organizations need to potential impact on the organization if the asset were to be
respond quickly to emerging threats or critical compromised
vulnerabilities on publicly facing devices. For example, Several factors can affect the asset value in vulnerability
if a new vulnerability is disclosed that affects web management:
servers, those internet-facing servers would be • Role of the Asset: The function of the asset in the
prioritized for patching organization can greatly influence its value. For
• Internal Web Applications: While also important, example, a server hosting critical applications or
vulnerabilities affecting internal web applications sensitive data would typically have a higher asset value
might be addressed after those on internet-facing than a peripheral device with no access to sensitive
servers, based on the reduced risk of immediate external information
exploitation • Data Sensitivity: Assets that store or process sensitive
• Workstations vs. Servers: A local privilege escalation data, such as personally identifiable information (PII),
vulnerability might be prioritized on workstations over financial data, or proprietary business information,
servers if the workstations are more likely to be targeted typically have a higher value due to the potential impact
through phishing emails, considering the context of of a data breach
how the devices are used • Business Impact: The potential impact on business
operations if the asset were to be compromised is a
VI. ASSET VALUE significant factor. This could include financial loss,
It discusses the importance of understanding the value of an operational disruption, reputational damage, or legal
asset in the context of vulnerability prioritization and regulatory consequences
• Asset Value Importance: The value of an asset plays • Asset Placement or Context: The location of the asset
a crucial role in vulnerability prioritization. Analysts in the network and its exposure to potential threats can
need to understand the value of an asset in conjunction also affect its value. For example, assets that are
with its context and placement in the network. This publicly accessible or located in a demilitarized zone
understanding helps in prioritizing vulnerabilities (DMZ) may be considered more valuable due to their
associated with critical assets increased risk of being targeted by attackers
• Ranking System: Teams can use a ranking system • Compensating Controls: The presence of security
within their application repository to identify critical controls that could mitigate the impact of a
assets. Vulnerabilities associated with these critical vulnerability can also affect the perceived value of an
assets should be prioritized for remediation. This asset. For example, an asset with robust security
approach helps analysts influence decisions to controls in place may be considered less valuable from
remediate vulnerabilities impacting business-critical a vulnerability management perspective because the
assets risk of successful exploitation is reduced
• Business Impact: If a device that is crucial to the In order to effectively prioritize vulnerabilities based on
operation of the business or holds critical information asset value, organizations need to maintain an accurate
were to be compromised, it could be catastrophic for the inventory of their assets and regularly assess their value in the
organization. Therefore, it is recommended to prioritize context of the organization's operations and risk tolerance
patching these devices over others. Incorporating
Read more: Boosty
VII. COMPENSATING CONTROLS • Security Awareness Training: Training users to
recognize and avoid potential security threats can
It discusses the role of layered security controls or defense-
reduce the risk of vulnerabilities being exploited
in-depth strategies in mitigating attacks executed by advanced through social engineering attacks
security threats. In terms of prioritizing vulnerabilities, compensating
• Role of Compensating Controls: Compensating controls can be used to lower the risk rating of certain
controls are security measures that make it more
vulnerabilities, allowing organizations to focus on remediating
difficult to exploit vulnerabilities. They are part of an
organization's layered security strategy, also known as other vulnerabilities first. However, it's important to note that
a defense-in-depth strategy the effectiveness of compensating controls should be regularly
• Controversy Over Severity Adjustment: The practice tested to ensure they are functioning as expected. This can be
of adjusting the severity of vulnerabilities based on done through red teaming exercises or using breach and attack
compensating controls is controversial. Some simulation tools.
stakeholders argue for lowering the severity of In addition to compensating controls, other factors that can
vulnerabilities under the assumption that the control is be used to prioritize vulnerabilities include the severity of the
effective. However, changing a vulnerability's severity vulnerability, the exploitability of the vulnerability, the value of
or risk rating without sufficient data can lead to the asset affected by the vulnerability, and whether the
misprioritization and weaken an organization's security
posture vulnerability is known to be exploited in the wild. Tools like the
• Testing Compensating Controls: The report Exploit Prediction Scoring System (EPSS) and the Stakeholder-
recommends testing the exploitation of vulnerabilities Specific Vulnerability Categorization (SSVC) can also be used
against the company's security stack in a sandboxed to help prioritize vulnerabilities
environment. This can be done by personnel with red
A. Difference between compensating controls and patching in
teaming expertise or by using a breach and attack
simulation tool to mimic the tactics, techniques, and vulnerability management
procedures (TTPs) of the exploitation activities In the context of vulnerability management, compensating
observed in malicious operations. This data can help controls and patching are two different strategies used to
determine if the severity or risk rating of certain mitigate the risk associated with identified vulnerabilities.
vulnerabilities can be decreased or increased Patching refers to the process of applying updates to
Compensating controls in vulnerability management are software or systems to fix known vulnerabilities. This is a direct
additional security measures put in place to mitigate the risk method of addressing vulnerabilities, as it involves modifying
associated with identified vulnerabilities. They are used when the system or software to eliminate the vulnerability. Patching
vulnerabilities cannot be immediately remediated due to is often the most effective way to prevent exploitation of a
technical constraints, business requirements, or other factors. vulnerability, but it can also be resource-intensive and
Compensating controls can help prioritize vulnerabilities by disruptive, as it may require systems to be taken offline or
reducing the risk associated with certain vulnerabilities, restarted. It's also important to note that not all vulnerabilities
allowing organizations to focus on remediating other, higher- have available patches, and even when they do, there can be
risk vulnerabilities first delays in applying them due to testing requirements or
Compensating controls can take various forms, including: operational constraints.
• Network Segmentation: This involves separating a On the other hand, compensating controls are alternative
network into multiple segments to limit an attacker's
measures implemented to mitigate the risk associated with a
ability to move laterally within the network. If a
vulnerability exists in one segment of the network, vulnerability when it is not feasible or desirable to apply a
network segmentation can prevent an attacker from patch. These controls do not fix the vulnerability itself, but they
exploiting that vulnerability to access other parts of the reduce the risk of exploitation. Examples of compensating
network controls include network segmentation, firewall rules, intrusion
• Firewalls and Intrusion Prevention Systems (IPS): detection systems, and additional monitoring. The use of
These tools can detect and block malicious traffic, compensating controls can be controversial, as they do not
potentially preventing the exploitation of certain eliminate the vulnerability and their effectiveness can be
vulnerabilities difficult to measure. However, they can be a valuable tool in
• Multi-factor Authentication (MFA): MFA can managing risk, particularly in cases where patching is not
prevent an attacker from gaining access to a system immediately possible.
even if they have obtained valid credentials, thus
mitigating the risk associated with vulnerabilities that While patching directly addresses and eliminates
could lead to credential theft vulnerabilities, compensating controls provide alternative ways
• Encryption: Encrypting data at rest and in transit can to mitigate the risk associated with vulnerabilities when
reduce the impact of vulnerabilities that could lead to patching is not feasible or desirable. Both strategies are
data exposure important components of a comprehensive vulnerability
• Regular Patching and Updates: Regularly updating management program.
and patching systems can help to mitigate the risk
associated with known vulnerabilities
Read more: Boosty
VIII. EPSS – EXPLOIT PREDICTION SCORING SYSTEM EPSS differs from traditional severity ratings, such as the
The Exploit Prediction Scoring System (EPSS) is a tool that Common Vulnerability Scoring System (CVSS), in several
helps prioritize vulnerabilities in cybersecurity. It provides a ways:
data-driven, probabilistic assessment of the likelihood of • Predictive Nature: EPSS is predictive, providing a
probability score based on the likelihood of
exploitation, which can complement traditional severity ratings
exploitation, whereas CVSS provides a severity score
and other vulnerability management strategies. based on the intrinsic characteristics of a vulnerability
• Challenges with Traditional Vulnerability Scoring: • Data-Driven Approach: EPSS uses a data-driven
Traditional vulnerability scoring systems, such as the effort that incorporates current threat information from
Common Vulnerability Scoring System (CVSS), have CVE and real-world exploit data, which is not the case
been criticized for not being sufficient to assess and with CVSS severity ratings
prioritize risks from vulnerabilities. Only a limited • Machine Learning Model: EPSS employs a machine-
subset of published vulnerabilities is ever observed learning model to predict exploit likelihood, using data
being exploited in the wild from sources like the MITRE CVE list and observations
• Introduction of EPSS: The EPSS is an open, data- from exploitation-in-the-wild activity from security
driven effort that uses a machine-learning model to vendors
predict the likelihood or probability that a vulnerability
will be exploited in the wild. This assists defenders in B. Benefits
prioritizing vulnerability remediation efforts more Benefits of using EPSS in vulnerability management
effectively. EPSS uses data from sources like the
MITRE CVE list, data about CVEs such as days since include:
publication, and observations from exploitation-in-the- • Efficient Prioritization: EPSS helps organizations
wild activity from security vendors prioritize vulnerabilities that pose the most risk and are
• EPSS Scoring: The EPSS model produces a most likely to be exploited, enabling them to allocate
probability score between zero and one (0 and 100%). resources more effectively
The higher the score, the greater the probability that a • Complement to CVSS: EPSS can be used alongside
vulnerability will be exploited CVSS to provide a more comprehensive view of
• Comparison with CVSS: EPSS is not meant to replace vulnerabilities, considering both the severity and the
CVSS but to complement it. While CVSS provides a likelihood of exploitation
severity rating for vulnerabilities, EPSS provides a • Reduction in Remediation Effort: By focusing on
prediction of the likelihood of exploitation. This vulnerabilities with a higher probability of being
additional information can help organizations prioritize exploited, organizations can reduce the number of
their remediation efforts more effectively vulnerabilities they need to address, saving time and
• Use of EPSS in Vulnerability Management: EPSS effort.
can be used in conjunction with other tools and IX. SSVC – STAKEHOLDER-SPECIFIC VULNERABILITY
strategies for vulnerability management, such as
focusing on known exploited vulnerabilities, CATEGORIZATION
considering the context or placement of devices, It discusses a methodology for prioritizing vulnerabilities
assessing asset value, and considering compensating based on various factors beyond just severity scores. SSVC is a
controls flexible, customizable, and evidence-based approach to
• Stakeholder-Specific Vulnerability Categorization vulnerability prioritization that takes into account a variety of
(SSVC): SSVC is another tool that can be used in factors beyond just severity scores. It helps organizations make
conjunction with EPSS. SSVC focuses on values,
informed decisions about which vulnerabilities to address first,
including the security flaw's exploitation status, its
impact on safety, and the prevalence of the affected based on their specific context and risk tolerance.
products. SSVC improves vulnerability management • SSVC Overview: SSVC is a vulnerability analysis
processes and accounts for diverse stakeholders methodology developed by Carnegie Mellon
University's Software Engineering Institute in
A. EPSS Difference coordination with the US Cybersecurity and
The Exploit Prediction Scoring System (EPSS) is a tool Infrastructure Security Agency (CISA). It operates as a
designed to estimate the likelihood that a software vulnerability decision tree that allows for flexibility in its application,
and it accounts for diverse stakeholders.
will be exploited in the wild. Its purpose is to assist network
• SSVC Decision Points: SSVC uses a decision tree to
defenders in better prioritizing vulnerability remediation efforts determine the response to a vulnerability. The possible
by providing a probability score between 0 and 1 (0 and 100%). outcomes are "Track", "Track*", "Attend", and "Act".
The higher the score, the greater the probability that a Each outcome has a recommended remediation
vulnerability will be exploited. timeline, ranging from standard update timelines
EPSS offers a more nuanced approach to vulnerability ("Track" and "Track*") to immediate action ("Act").
management by predicting the likelihood of exploitation, which • Customizability: SSVC is customizable, helping
complements the severity assessment provided by traditional analysts decide on vulnerability response actions
scoring systems like CVSS. This predictive capability can consistent with maintaining the confidentiality,
significantly benefit organizations in prioritizing their integrity, and availability of enterprise systems as
agreed upon with leadership. It is a dynamically applied
vulnerability remediation efforts.
Read more: Boosty
concept, with new versions released to recognize • Determining Automatability: Assessing if the
improvements and integrate feedback. vulnerability is self-propagating or requires additional
• Focus on Values: SSVC focuses on values, including steps for an attacker to exploit.
the security flaw's exploitation status, its impact on • Considering Mission Prevalence: Evaluating how
safety, and the prevalence of the affected products. It prevalent the affected product is within the organization
improves vulnerability management processes by and its importance to business continuity.
considering these factors. • Making Informed Decisions: Using the decision tree
• Evidence-Based Decisions: SSVC decisions are based to make informed decisions about which vulnerabilities
on a logical combination of triggers set by leadership in to address first, based on the organization's specific
response to factors such as the vulnerability's state of exposure level and recommended actions.
exploitation, the level of difficulty for an adversary to
exploit it, and its impact on public safety. Analysts C. Difference between SSVC and traditional severity ratings
collect evidence of the relevant triggers and use the in vulnerability management
decision tree's logic to establish triage priority Traditional severity ratings in vulnerability management,
decisions. such as the Common Vulnerability Scoring System (CVSS),
• Beyond Base Scores: SSVC goes beyond just base provide a numerical score to indicate the severity of a
scores as a stand-alone prioritization method. It helps
organizations efficiently prioritize and triage vulnerability. These scores are based on a set of metrics that
vulnerabilities while navigating the uncertainties of include the attack vector, attack complexity, privileges
what issues to address first. required, and user interaction, among others. However, these
traditional ratings have been criticized for not being sufficient
A. Key Components of the SSVC Methodology to assess and prioritize risks from vulnerabilities, as they do not
The Stakeholder-Specific Vulnerability Categorization consider whether a vulnerability has been exploited in the wild.
(SSVC) methodology is a decision-tree-based approach On the other hand, the Stakeholder-Specific Vulnerability
developed by Carnegie Mellon University's Software Categorization (SSVC) is a more dynamic and flexible
Engineering Institute in coordination with the US Cybersecurity approach to vulnerability management. SSVC focuses on
and Infrastructure Security Agency (CISA). The key values, including the security flaw's exploitation status, its
components of the SSVC methodology include: impact on safety, and the prevalence of the affected products. It
• Decision Points: SSVC uses a decision tree with operates as a decision tree that allows for flexibility in its
decision points that lead to different outcomes based on application, enabling organizations to customize it to their
the analysis of the vulnerability. These decision points specific needs. SSVC provides a more comprehensive view of
include the state of exploitation, technical impact, the risk associated with a vulnerability by considering factors
automatability, mission prevalence, and public well- such as the state of exploitation, technical impact, mission
being impact.
• Possible Outcomes: The decision tree leads to one of prevalence, and public well-being.
four possible outcomes: Track, Track*, Attend, and While traditional severity ratings provide a standardized
Act. Each outcome has a recommended remediation measure of the severity of a vulnerability, they do not take into
timeline, with "Act" requiring immediate action. account whether the vulnerability is being exploited or its
• Customizability: SSVC is designed to be impact on the organization. SSVC, on the other hand, provides
customizable, allowing organizations to tailor the a more comprehensive and customizable approach to
decision-making process to their specific needs and vulnerability management by considering a wider range of
concerns. factors.
• Evidence-Based Decisions: Decisions within SSVC
are made based on evidence regarding the D. Scoring decisions in the SSVC methodology
vulnerability's exploitation status, difficulty of The Stakeholder-Specific Vulnerability Categorization
exploitation, and impact on public safety. (SSVC) methodology is a decision-making process for
• Dynamic Application: SSVC is intended to be a vulnerability response actions. It was developed by Carnegie
dynamically applied concept, with new versions
Mellon University's Software Engineering Institute in
released to incorporate improvements and feedback.
coordination with the US Cybersecurity and Infrastructure
B. Using SSVC to Prioritize Vulnerabilities Security Agency (CISA). The SSVC methodology provides
SSVC can be used to prioritize vulnerabilities in an effective four scoring decisions, which are:
and efficient way by • Track: The vulnerability does not currently require
• Assessing Impact: Analyzing the impact of a action, but the organization should continue to monitor
vulnerability on the organization's operations and the it and reassess if new information becomes available.
public well-being to determine the urgency of CISA recommends remediating Track vulnerabilities
remediation. within standard update timelines.
• Evaluating Exploitation Status: Considering whether • Track*: The vulnerability has specific characteristics
there is active exploitation or proof of concept available that may require closer monitoring for changes. CISA
for the vulnerability. recommends remediating Track* vulnerabilities within
standard update timelines.
• Attend: The vulnerability requires attention from the
organization's internal, supervisory-level individuals.
Read more: Boosty
Necessary actions include requesting assistance or • Mission Prevalence: The decision tree includes an
information about the vulnerability and may involve assessment of how prevalent the affected product is
publishing a notification either internally and/or within the organization and its importance to business
externally. CISA recommends remediating Attend continuity. This helps to prioritize vulnerabilities that
vulnerabilities sooner than standard update timelines. could have an impact on the organization's operations
• Act: The vulnerability requires attention from the
organization's internal, supervisory-level, and X. METRICS
leadership-level individuals. Necessary actions include It discusses the role of metrics in evaluating and improving
requesting assistance or information about the a vulnerability management program. It emphasizes the
vulnerability, as well as publishing a notification either
internally and/or externally. Typically, internal groups importance of using detailed and informative metrics to assess
would meet to determine the overall response and then the effectiveness of a vulnerability management program. By
execute agreed upon actions. CISA recommends focusing on key risk indicators and compartmentalizing
remediating Act vulnerabilities as soon as possible. metrics, organizations can gain actionable insights and
prioritize remediation efforts more effectively.
E. Examples of SSVC • Metrics as Indicators: Metrics are essential for
Here are examples of how SSVC can be applied in highlighting the effectiveness of a vulnerability
vulnerability management: management program and identifying areas that need
• Customized Decision Tree: SSVC uses a decision tree improvement. They provide a way to measure the
that is tailored to the organization's needs. For example, program's performance and guide strategic decisions
an organization can customize the decision tree to focus • Beyond Severity Counts: Simply counting the number
on factors such as the vulnerability's exploitation status, of critical, high, medium, and low severity
its impact on safety, and the prevalence of the affected vulnerabilities is not enough to determine if
products remediation efforts are meeting goals. Metrics should
• Possible Outcomes: The SSVC decision tree leads to be more nuanced and informative
one of four possible outcomes: Track, Track*, Attend, • Compartmentalization of Metrics: Metrics should be
and Act. Each outcome has a recommended compartmentalized by technology, placement on the
remediation timeline, with "Act" requiring immediate network, and the Service Level Agreement (SLA)
action. This helps organizations to prioritize outlined in the company policy. This helps to identify
vulnerabilities based on the level of attention they specific areas that require improvement
require • Focus on Known Exploited Vulnerabilities:
• Evidence-Based Decisions: Decisions within SSVC Distinguishing between known exploited
are made based on evidence regarding the vulnerabilities and those not currently exploited can
vulnerability's exploitation status, difficulty of reduce noise and direct teams to remediation efforts that
exploitation, and impact on public safety. For instance, need more visibility
if a vulnerability is being actively exploited with a high • Key Risk Indicators vs. Key Performance
technical impact, the decision might be to "Act" Indicators: Organizations should focus on key risk
immediately indicators rather than just key performance indicators.
• Practical Use Case: A practical example provided in This approach highlights specific insights obtained
the document is the prioritization response to the Citrix from vulnerability data, which can be more actionable
ShareFile vulnerability, identified as CVE-2023-24489. • Example of Risk-Based Metrics: An example
Using SSVC, an organization would likely choose the provided in the document is the comparison of
"Act" value after running information collected by remediation times for vulnerabilities on different
analysts against the decision points and associated platforms, such as Chrome and Edge. This comparison
values. This decision is influenced by the existence of can reveal which platform poses a higher level of risk
proof-of-concept code, evidence of targeted attacks, based on the time it takes to remediate vulnerabilities
and in-the-wild exploitation • Actionable Insights: Performance metrics should be
• Public Well-Being: SSVC also considers the potential used to show areas of risk, allowing organizations to
impact on public well-being. For example, if a take actionable steps rather than just tracking individual
vulnerability could lead to physical harm or expose vulnerabilities
sensitive payment information, it would likely be
prioritized for immediate action

You might also like