Vulnerability+Management+Slides
Vulnerability+Management+Slides
by Christopher Nett
Connect with me!
My Website LinkedIn
Azure Newsletter X
Threads
Christopher Nett
It is a complex world we live in
Networks
IoT
ICS & OT
Cloud
Mobile Devices
People
Servers
Endpoints
Christopher Nett
Cyber Security Challenges
A lot of alerts
More Overwhelming Evolving
are never
sophisticated access to regulatory
really
threats data landscape
investigated
Christopher Nett
What is a Security Operations Center (SOC)?
Threat
Threat Hunting Log Management
Intelligence
Reducing Attack
SOC Analysts Threat Detection
Surface
Christopher Nett Source: What is a security operations center (SOC)? | Microsoft Security
SOC Model
• Advanced malware
Tier 2 • Hard tasks
25% of Alerts
• Commodity malware
Tier 1 70% of Alerts
• Easier tasks that can or should not be automated
• Commodity malware
Automation • Repetitive Tasks
• Mimics the steps an analyst would take in easy cases
Christopher Nett Source: What is a security operations center (SOC)? | Microsoft Security
Cyber Security Incident Response Process
Containment,
Detection & Post-Incident
Preparation Eradication &
Analysis Activity
Recovery
Christopher Nett Source: What is a security operations center (SOC)? | Microsoft Security
Blue and Red Teaming
Security Vulnerability
Monitoring Assessments
Penetration
Incident Response Testing
Simulate
Threat Hunting adversary TTPs
Christopher Nett
Purple Teaming
Christopher Nett
What is a Threat?
Christopher Nett Source: Security and Privacy Controls for Information Systems and Organizations (nist.gov)
Intelligence, Threat Intelligence and CTI
Intelligence
Threat Intelligence
Cyber Threat Intelligence
Enabling Threat-Informed-Defense
Producing
Risk
Impact + Likelihood
Christopher Nett Source: Security and Privacy Controls for Information Systems and Organizations (nist.gov)
Threat-Informed-Defense
Christopher Nett
Tactics, Techniques and Procedures
Christopher Nett Source: What Are TTPs? Tactics, Techniques & Procedures Explained | Splunk
IOCs and IOAs
IOCs IOAs
TTPs Tough!
Tools Challenging
Network/
Annoying
Level of Host Artifacts
difficulty
Domain Names Simple
IP Addresses Easy
Christopher Nett Source: Enterprise Detection & Response: The Pyramid of Pain (detect-respond.blogspot.com)
What is Threat Hunting?
Christopher Nett
What is Zero Trust?
Christopher Nett Source: Zero Trust Model - Modern Security Architecture | Microsoft Security
The Microsoft Security Cosmos
Christopher Nett Source: Microsoft Cybersecurity Reference Architectures (MCRA) | Microsoft Learn
Defending Across Attack Chains
Entra ID Protection
Defender for
Defender for Office 365 Defender for Endpoint Defender for Identity Cloud Apps
Defender XDR
Sentinel
Copilot for Security
Christopher Nett Source: Microsoft Cybersecurity Reference Architectures (MCRA) | Microsoft Learn
Cloud Computing Properties
Public
Cloud Multi Cloud
Azure
AWS GCP
Hybrid Cloud
Private
Cloud
AWS Google
Azure Stack
Outposts Anthos
Christopher Nett Source: Global Network – Backbone Networking Infrastructure | Microsoft Azure
Shared Responsibility in Azure
Responsibility On-prem IaaS PaaS SaaS
Applications
Network Controls
Operating System
Physical Hosts
Physical Network
Physical Datacenter
Christopher Nett Source: Shared responsibility in the cloud - Microsoft Azure | Microsoft Learn
Azure Subscription Types
• Free credits for 30 • Free credits for 12 • Pay for what you • One consumption
days months use agreement for all
• Some services are • No credit card • Credit card Azure services
free for 12 months required required • Various different
billing models
Christopher Nett Source: Create Your Azure Free Account Today | Microsoft Azure
Entra ID Tenants and Azure Subscriptions
Identities
Christopher Nett Source: Microsoft Entra ID documentation - Microsoft Entra ID | Microsoft Learn
Azure Resource Hierarchy
Management Groups
Subscriptions
Resource Groups
Resources
Christopher Nett
What is a Vulnerability?
• Led by MITRE
• Every newly discovered vulnerability is assigned a CVE ID in the form
of CVE-yyyy-xxxx
• Includes a vulnerability description, data sources as well as the official
vendor announcement
Christopher Nett
Common Vulnerabilities and Exposures (CVE)
• CVE-2009-2935
• Google V8, as used in Google Chrome before 2.0.172.43, allows
remote attackers to bypass intended restrictions on reading memory,
and possibly obtain sensitive information or execute arbitrary code in
the Chrome sandbox, via crafted JavaScript.
• CVSS Version 2.0 Score: 10.0
CVSSv2 CVSSv3
CVSS Score Severity CVSS Score Severity
7.0 – 10.0 High 9.0 – 10.0 Critical
4.0 – 6.9 Medium 7.0 – 8.9 High
0.0 – 3.9 Low 4.0 – 6.9 Medium
0.1 – 3.9 Low
0 None
Christopher Nett Source: https://nvd.nist.gov/vuln-metrics/cvss
Where can Vulnerabilities occur?
Applications
Middleware
Hardware
Christopher Nett
Zero Days
Time
Christopher Nett
Zero Days
Christopher Nett
Outdated Software
Exploit
Christopher Nett
Cloud Misconfigurations
Threat Actor
Public Azure Storage Account
Christopher Nett
Remote Code Execution
On-Premises Datacenter
Christopher Nett
Overview
Applications
Heartbleed
Middleware Log4Shell
Hardware
Meltdown
Christopher Nett
Heartbleed
• CVE-2014-0160
• CVSS 3.1 Score: 7.5
• The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before
1.0.1g do not properly handle Heartbeat Extension packets.
• This allows remote attackers to obtain sensitive information from
process memory via crafted packets that trigger a buffer over-read,
as demonstrated by reading private keys, related to d1_both.c and
t1_lib.c, aka the Heartbleed bug.
Server, send me this 500 letter word if you are User Bob has
there: connected. User
“Alice” Bob wants 5
letters : Alice.
Server master
Alice. Server master key is 216351235.
key is
Bob
216351235.
Christopher Nett
Log4Shell
• CVE-2021-44228
• Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2,
2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and
parameters do not protect against attacker controlled LDAP and other JNDI
related endpoints.
• An attacker who can control log messages or log message parameters can
execute arbitrary code loaded from LDAP servers when message lookup
substitution is enabled. From log4j 2.15.0, this behavior has been disabled by
default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality
has been completely removed. Note that this vulnerability is specific to log4j-core
and does not affect log4net, log4cxx, or other Apache Logging Services
projects.
• CVSSv3 Score: 10.0
• CVE-2017-0144
• CVSS 3.1 Score: 8.1
• The SMBv1 server in Microsoft Windows Vista SP2; Windows Server
2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server
2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and
1607; and Windows Server 2016.
• It allows remote attackers to execute arbitrary code via crafted
packets, aka "Windows SMB Remote Code Execution Vulnerability."
Christopher Nett
Meltdown
• CVE-2017-5754
• CVSS 3.1 Score: 5.6
• Systems with microprocessors utilizing speculative execution and
indirect branch prediction may allow unauthorized disclosure of
information to an attacker with local user access via a side-channel
analysis of the data cache.
• Intel x86 microprocessors, IBM POWER processors, and some ARM-
based microprocessors
Christopher Nett
Identification
Remediation Prioritization
Christopher Nett
Identification
Remediation Prioritization
Christopher Nett
Identification
Remediation Prioritization
Christopher Nett
Identification
Remediation Prioritization
Christopher Nett
Identification
Remediation Prioritization
Christopher Nett
Vulnerability Management Architecture
Reporting
Scan Remediation
Scan Remediation
Agent-based Vulnerability
IT Operations
Scanners
On-premises Resources
Scan Remediation
Employee Devices
• Imagine you are the CISO at EnergyCorp, one of the largest energy
providers in your country.
• EnergyCorp has recently experienced a series of cyber attacks that
exposed vulnerabilities in its IT infrastructure, affecting both its
operations and reputation.
• The company realized the need to establish a robust vulnerability
management program to identify, assess, prioritize, and remediate
vulnerabilities before they could be exploited by malicious actors.
Christopher Nett
Scenario
Christopher Nett
Steps
Christopher Nett
Define Strategic Goals
Christopher Nett
Identify Vulnerability Management Requirements
Christopher Nett
Establish Processes and Tools
Christopher Nett
Establish Vulnerability Management Architecture
Christopher Nett
Continuous Improvement
Christopher Nett
Scenario
Christopher Nett
Agent-based Vulnerability Scanning for VMs
Christopher Nett Source: Enable vulnerability scanning with the integrated Qualys scanner - Microsoft Defender for Cloud | Microsoft Learn
Agentless Vulnerability Scanning for VMs
Isolated
• Requires Defender CSPM or Customer Scanning Defender for
Defender for Servers Plan 2 Environment Environment Cloud
Vulnerability Display
Scan CVEs
Disk
Snapshot
Christopher Nett Source: Learn about agentless scanning for VMs - Microsoft Defender for Cloud | Microsoft Learn