A vulnerability assessment is a way you can discover, analyze and mitigate weakness within your attack surface to lessen the chance that attackers can exploit your network and gain unauthorized access to your systems and devices. With an ever-expanding attack surface, protecting your organization from cyber risk is challenging. A vulnerability assessment
program can reduce your organizational risks by eliminating blind spots in your attack surface, discover and analyze all of your assets, and help you plan for remediation of the vulnerabilities and weaknesses that pose the greatest risk to your organization. Vulnerability assessment and vulnerability management
are different, but complementary. A vulnerability assessment is a one-time project you conduct on a regular basis to identify all of your assets and vulnerabilities. Generally, a vulnerability assessment, which is not the same as a vulnerability scan, has a specified beginning and end date. It’s a snapshot of your attack surface at a specific point in time. Vulnerability management, on the other hand, is
an ongoing program that uses a variety of tools and processes that helps you identify all of the assets and vulnerabilities across your enterprise but also helps you plan how you will mitigate issues, remediate weaknesses, and improve your overall security posture. A vulnerability assessment is part of your overall vulnerability management program, which helps you continuously identify and address your cyber risks.
A vulnerability is a weakness or hole in hardware or software that can be exploited to compromise systems and give attackers access to your data and information. Basically, they’re “bugs” or programming mistakes. Vulnerabilities are commonly fixed, or remediated, by repairing issues within code, known as patching, or fixing misconfigurations to improve operational security. The more complex a system is, the more lines of code it will
likely have, meaning there’s a greater chance of programming mistakes somewhere in that code. That’s why, say for operating systems, you’ll often get notifications that you need updates to fix issues. Vulnerabilities can also be found when systems are misconfigured, creating additional opportunities for attackers to exploit your system. Here are some common ways attackers target organizations through vulnerabilities and weaknesses: The Open Web Application Security Project (OWASP) maintains a list of top vulnerabilities,
updated most recently in 2017. OWASP’s list takes a closer look at the top 10 critical web application security risks. The risks include: Today’s attack surface no longer includes just traditional IT assets like servers, desktop machines and your network. The modern attack surface now also includes dynamic devices that may appear intermittently on your network
like laptops, smartphones and tablets, and also Internet of Things (IoT) devices, operational technology (OT), containers and cloud environments. Attackers know most organizations struggle to keep up with visibility into all of their assets. Add that to the challenges of mitigating and remediating the volume of vulnerabilities discovered by most vulnerability assessment programs, and it may feel like attackers always have the upper hand. That’s why it’s important to develop a robust,
flexible and scalable vulnerability assessment program to continuously discover and assess all of your assets and vulnerabilities to decrease your overall cyber risk. When looking at your attack surface, here are a few key steps you don’t want to miss: Today’s modern and vast IT landscape means
most likely you have blind spots and don’t have the comprehensive insight you need into your entire attack surface. Here are some common challenges when assessing your attack surface:1. Vulnerability Assessment Overview
What is vulnerability assessment?
What's the difference between vulnerability assessment and vulnerability management?
2. Assets, Vulnerabilities and Your Attack Surface
What is a vulnerability?
Top Vulnerability Types
What does my organization’s attack surface look like?
Visibility Challenges
Vulnerability Assessment Styles
Are the different vulnerability assessment styles?
Yes. There are four general types of vulnerability assessment styles. That’s what the team at Tenable Research discovered and released in its Cyber Defender Strategies report after analyzing more than 2,100 organizations.
Here’s what those four vulnerability assessment styles look like:
- Minimalist: Minimalists do bare minimum vulnerability assessments as required by compliance mandates. About 33% of organizations in the study are minimalists, meaning they only conduct limited assessments on select assets. These organizations are exposed to risk and have more work to do on improving their cybersecurity posture.
- Surveyor: Surveyors do more frequent vulnerability assessments than Minimalists, but they are broad in scope. About 19% of organizations in the study are Surveyors. They don’t use authentication or customize scan templates when they conduct these assessments, which leaves them in a low-to-mid-level security posture.
- Investigator: The Investigator’s vulnerability assessments are at a high-maturity level, but these assessments are only on select assets. About 43% of organizations surveyed are Investigators. These organizations have a solid vulnerability assessment strategy and they do assessments on a good cadence and use asset authentication and prioritization, with targeted scan templates. This is level three in the four levels of maturity, but the program’s cybersecurity posture can mature further.
- Diligent: The Diligent vulnerability assessment style is the highest level of maturity. Only about 5% of organizations are Diligent, meaning they have near-continuous visibility into all of their assets and they conduct assessments with high frequency. Diligent organizations do targeted and customized assessments with comprehensive asset coverage. They also will tailor scans required on a case-by-case basis.
4. Vulnerability Assessment Solutions
Why do I need to do vulnerability assessment?
Unpatched software, misconfigured systems, and other weaknesses can create devastating implications for your organization.
A single successful breach into your environment, for example, a successful phishing attempt that lands ransomware on one of your servers, could cost your business hundreds of thousands of dollars in remediation and recovery expenses; extended downtime that can last days or longer; lost customers and a drop in sales and revenue; brand and reputational damage; and in some cases, a successful attack can shut down your business altogether.
With about 9,000 recorded breaches in the past 10 years, your organization is increasingly vulnerable to a cyber attack. And although more than 30% of organizations say they’ve had a cyber attack on their operational infrastructure, more than 62% around the world aren’t confident they’re ready to deal with an attack.
While attackers are constantly looking for ways to exploit weaknesses and get into your system, malware and phishing schemes are common attack methods. The average cost of a malware attack in the past two years is more than $2 million and ransomware continues to be an increasing threat for organizations of all sizes.
On average, a business becomes a victim to ransomware every 13 seconds. Phishing emails are the most effective way in, with 91% of attacks starting with phishing. In the past year, 76% of businesses said they had been targeted by a phishing attack.
Add to these exploit vectors the volume and diversity of asset types and it is increasingly more challenging for security teams to adapt and remediate every vulnerability that could affect your organization.
That’s why today’s most successful vulnerability assessment programs rely on tools and resources that facilitate continuous asset discovery and vulnerability monitoring, along with processes to prioritize threats based on actual risk to your organization.
Benefits of a vulnerability assessment program
Vulnerability assessment helps you discover and analyze weaknesses within your attack surface to reduce the chance attackers can exploit your network and gain unauthorized access to your data.
From malware to weak passwords and everything in between, threats to organizations of all sizes continue to increase, as does the cost to stop and fix and attack once it’s underway. That’s why it’s increasingly important to adopt a vulnerability assessment program to better understand your Cyber Exposure and keep your organization safe.
If you’re still considering whether or not a vulnerability assessment program is right for you, here are a few benefits to consider:
Discover Vulnerabilities
A vulnerability assessment program can help you discover all of your vulnerabilities including software flaws, missing patches, malware, and misconfigurations, so you can stay a step ahead of mitigate them before attackers infiltrate your attack surface.
Map Your Assets
By discovering all the assets in your organization, you can create a detailed map of your entire attack surface.
Maintain an Up-to-Date Asset Inventory
Asset discovery enables you to create an inventory of all your assets, even those that only occasionally connect to your network and those that are short-lived.
Understand Your Cyber Risks
Your vulnerability assessment program should give you insight into all of your assets and all of your vulnerabilities so you can determine your cyber risks and make solid business and security decisions to mitigate those risks. This will also help you build a stronger security posture.
Audit Patching
A vulnerability assessment program can help you better manage your patching plans, including insight into any configuration changes, so you can better plan for and evaluate the success of your remediation strategies.
Better Communication of Critical Information
Reporting on your vulnerability assessments can help you keep key stakeholders, from management to clients informed about all vulnerabilities and misconfiguration issues.
Choosing a vulnerability assessment solution that enhances your vulnerability management program
While your organization will have unique needs when it comes to selecting a vulnerability assessment solution, there are some core considerations applicable across industries. Here are four things to consider when evaluating a vulnerability assessment solution:
Continuous and Complete Discovery of Assets
When it comes to asset discovery and vulnerability assessment, your solution should offer a wide range of coverage including continuous asset discovery and complete visibility into your attack surface.
Assessment: More Than Just a Scan
Asset assessment in today’s modern IT environment is more than just running a scan.
Questions to ask your vendor:
Analyzing risks for remediation
With an array of data collection tools in your comprehensive vulnerability assessment program, teams often struggle with vulnerability data overload. What do you do with all the information you gather? Which vulnerabilities are likely to have the greatest real-world impact on your organization and may be exploited in the near future? How do you prioritize remediation?
A vulnerability assessment solution that leverages machine learning can help your team get a handle on data so you can uncover blind spots and hidden patterns to better assess future threats to your organization.
Simplified Pricing, Licensing and Growth Opportunities
Your vulnerability assessment solution should have a simple and straightforward pricing and licensing model and can scale as your organization grows and changes.
Do you provide passive network monitors to continuously discover assets?
Do you provide agents that work with both cloud-based and on-premise deployments?
Do you provide cloud connectors for live visibility into Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP) environments?
Do your container image scans consider layer hierarchy to reduce false positives?
Do you provide passive monitoring for OT and IoT vulnerability detection?
Has your research team discovered any Zero-day vulnerabilities in the last 12 months? If yes, how many?
Does your vulnerability scoring primarily look at historical data such as the existence of exploits or does it incorporate real-time intelligence about current threats?
Does your vulnerability scoring leverage machine learning?
What about automated asset criticality scoring?
If you’d like to take a deeper dive into how to choose the best vulnerability assessment solution for your organization, check out Gartner’s Guide to Choosing a Vulnerability Assessment Solution.
5. Vulnerability Assessment Processes
Implementing a vulnerability assessment program
If you’re ready to implement a vulnerability assessment program for your organization, you may be unsure exactly where to begin. Here are five steps you can take to set the foundation for your vulnerability assessment program and improve it as your company changes and evolves over time.
Step 1: Program planning
Before implementing your vulnerability assessment program, plan core components and set objectives.
Begin by reviewing your existing organizational and security policies and procedures.
- Are they current?
- Are they effective?
- How will you align your vulnerability assessment program with these existing policies?
- Don’t forget to include compliance and regulatory components.
After reviewing your existing plans and policies, define the scope of your vulnerability assessment program, including timelines, priorities, goals, and quantifiable metrics. This is also a good time to define roles for key players with an overview of responsibilities.
Step 2: Initial Assessment
Your initial assessment will create a baseline from which you can build your vulnerability assessment program.
This assessment should include identification of all of your assets across all of your environments.
After identifying assets, you’ll need to determine the criticality of each as they relate to your business operations. You’ll also need to identify who owns or is responsible for each asset, with additional information about who has access to each device.
Your initial assessment should also include a review of all your ports to see if any are open that should not be. Also, review all services to identify any that are active but shouldn’t be.
This initial assessment phase is also a good time to determine if systems, processes and apps are up-to-date. Check out every application and data source. This includes reviewing all software to determine if any unauthorized software is on your assets. Also, look for configuration issues to see if attackers can exploit any misconfigurations.
Step 3: Conduct a vulnerability scan
Now it’s time to conduct your first vulnerability scan. Here are some scan suggestions:
- All applications
- All ports
- Your firewall(s)
- CMS systems and web platforms
- HIPAA and other compliance and regulation standards such as PCI DSS and GDPR
- OWASP Top 10
- DoS and DDoS
Step 4: Create reports
After completing your vulnerability scan, you’ll need to create reports to share information with your teams.
In general, your reports should include the following information to help prioritize remediation and facilitate communication about your program effectiveness with your organizational stakeholders:
- Name of the vulnerability and date it was discovered
- Description of the vulnerability and which assets are affected
- Vulnerability rating based on your adopted scoring scoring systems like CVSS for CVEs
- Plans to remediate the vulnerability
- How long the vulnerability existed
- When the vulnerability was fixed and how long that took
- Which steps were taken to fix the issue
- Any follow-up steps
Step 5: Remediate
Once you’ve analyzed your vulnerabilities and shared detailed reports with your team, it’s time to plan and fix those weaknesses.
Remember, most vulnerability assessments return lengthy lists of vulnerabilities and it can be challenging to know which ones to fix first. You can prioritize your remediation plans based on your vulnerability scoring systems and asset criticality.
Start with vulnerabilities most likely to pose the greatest risk to your organization in the near future and then work your way further down your list of less critical weaknesses.
Vulnerability assessment best practices
A successful, flexible and scalable vulnerability assessment program should:
- Facilitate high-speed, accurate scanning across all of your IT environments. These scans should go beyond just your traditional attack surface such as desktop machines, servers and your network, to also include mobile devices like smartphones, laptops and tablets, but also your cloud environments, IoT devices, OT devices and containers.
- Automate manual and repetitive tasks to speed up your insight and response into potential weaknesses within your attack surface.
- Provide insight into your assessment program success with configurable reports so you can communicate your program’s effectiveness to key stakeholders, identify gaps, and make business and security-related decisions that align with overall goals and objectives for your organization.
- Help determine the criticality of all of your assets so you can prioritize which vulnerabilities may put your organization at the greatest risk
- Help you plan for patching and remediation to reduce your cyber risk and the size of your attack surface, while causing the fewest disruptions to your day-to-day business operations.
- Determine your Cyber Exposure Score (CES), so you can have a better understanding of your assessment program success and where you need to make improvements or adjustments.
- Benchmark your program’s effectiveness internally across departments as well as against industry peers to better understand how well you’re doing in reducing your cyber risk so you can communicate this information to your teams and key stakeholders.
6. Vulnerabilities and Penetration Testing
What is penetration testing?
Penetration testing is a supplementary component to you vulnerability assessment processes. In penetration testing, pen testers use a variety of exploitation methods to try to get around your existing cybersecurity measures by compromising vulnerabilities or other security weaknesses in your attack surface.
Generally, a third party does penetration testing and launches intentional exploits on your attack surface (or specific parts of it) to prove a vulnerability exists. After a pen test, your tester will report findings back to you so you can plan remediation and take steps to improve your overall cybersecurity posture.
What’s the difference between vulnerability assessment and penetration testing?
Vulnerability assessment and penetration testing are different processes, but they work together. Penetration testing is a stand-alone activity that gives you insight into your attack surface from a specific point in time, but vulnerability assessment is an ongoing process. Pen testing helps you understand how well your vulnerability assessment and vulnerability management programs are working and where you may have weaknesses that should be addressed. Pen tests can also help you gather information about your cybersecurity posture so you can set goals to improve your vulnerability assessment processes.
What are the phases of penetration testing?
There are generally five phases for a penetration test and they look like this:
- Your penetration test begins with a planning phase to outline goals and set testing expectations.
- Next, determine the scope of the test. Do you want your pen tester to target your entire network or a specific subset? Will the tester do credentialed or non-credentialed scanning? Will your security team be aware of the tests and when they’re happening?
- Once you’ve scoped testing parameters, your tester is ready to begin. The goal is to try to find weaknesses within your network, just like an attacker would in a real-world scenario.
- After conducting the test, your tester will report findings for your review.
- Once you’ve reviewed those results, use that information to plan for remediation and address the security issues the tester discovered.
What are the different approaches to penetration testing?
There are two core approaches to penetration testing, and a third that is a variation of the two: whitebox testing, blackbox testing, and grey box testing.
Whitebox testing: The third-party tester knows information about the target and the tests generally take place within a credentialed environment.
Blackbox testing: No target information is shared with your tester, and your tester conducts network sweeps without credentials.
Grey box testing: A mix where your organization may provide the tester with only partial details about targets.
Nessus Professional is a complementary tool that can help testers discover possible vulnerabilities or weaknesses within your attack surface before launching tests.
What is vulnerability scanning?
Vulnerability scanning helps you discover vulnerabilities and weaknesses within your attack surface—across all of your assets—so you can plan for remediation to decrease your overall cyber risk. There are a number of automation tools you can use for vulnerability scanning, for example, Nessus Pro. These tools help you build an inventory of all of your assets across your network and enable automated scanning when a device connects to your enterprise.
Related Products
The #1 vulnerability assessment solution.
View More
Vulnerability Assessment Resources
How to Use Vulnerability Testing for Risk Assessment
Nessus User Guide
Advanced Dynamic Scan Policy in Nessus Professional
Copyright 2020 Tenable, Inc. All Rights Reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, inc. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, inc. All other products or services are trademarks of their respective owners.
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
BUY
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
65 assets
Choose Your Subscription Option:
Thank You
Thank you for your interest in Tenable.io. A representative will be in touch soon.
Try Nessus Professional Free
FREE FOR 7 DAYS
Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy Nessus Professional
Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.
Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.
Tenable.io
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.
Tenable.io
BUY
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
65 assets
Choose Your Subscription Option:
Thank You
Thank you for your interest in Tenable.io. A representative will be in touch soon.
Try Tenable.io Web Application Scanning
Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.
Buy Tenable.io Web Application Scanning
Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.
Try Tenable.io Container Security
Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.
Buy Tenable.io Container Security
Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.
Thank You
Thank you for your interest in the Tenable.io Container Security program. A representative will be in touch soon.
Try Tenable Lumin
Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.
Buy Tenable Lumin
Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.
Thank You
Thank you for your interest in Tenable Lumin. A representative will be in touch soon.
Request a demo of Tenable.sc
Please fill out this form with your contact information.
A sales representative will contact you shortly to schedule a demo.
* Field is required
Request a demo of Tenable.ot
Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.
Thank You
Thank you for your interest in Tenable.ot. A representative will be in touch soon.
Request a demo of Tenable.ad
Continuously detect and respond to Active Directory attacks. No agents. No privileges.
On-prem and in the cloud.
Try Tenable.cs
Enjoy full access to detect and fix cloud infrastructure misconfigurations in the design, build and runtime phases of your software development lifecycle.
Buy Tenable.cs
Contact a Sales Representative to learn more about Cloud Security and how you can secure every step from code to cloud.
Thank You
Thank you for your interest in Tenable.cs. A representative will be in touch soon.
See Tenable.ep In Action
Know the exposure of every asset on any platform.
See Tenable.asm In Action
Know the exposure of every asset on any platform.
Thank You
Thank you for your interest in Tenable.asm. A representative will be in touch soon.
Try Nessus Expert Free
FREE FOR 7 DAYS
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.
Already have Nessus
Professional?
Upgrade to Nessus Expert free for 7 days.
Buy Nessus Expert
Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.