Explain various activities associated with vulnerability management
Vulnerability management is the continuous cycle of finding, evaluating, remediating, and verifying security weaknesses. It’s not just scanning — it’s the full lifecycle from discovery to closure.
Vulnerability Identification
Scanning Types
- Credentialed (authenticated): Scanner logs into systems with valid credentials. Sees installed software, configurations, missing patches. More accurate, fewer false positives.
- Non-credentialed (unauthenticated): Scanner probes from the network without credentials. Only sees what’s externally visible. Faster but less thorough.
- Agent-based: Lightweight agent installed on endpoints reports vulnerabilities continuously. Works for devices that aren’t always on the network (laptops, remote workers).
- Agentless: Scanner-initiated from a central point. Simpler to deploy but requires network access to targets.
Active vs. Passive
- Active scanning: Sends probes to targets. Can be disruptive to sensitive systems (ICS/SCADA).
- Passive scanning: Monitors network traffic to identify vulnerabilities. Non-disruptive but less thorough.
Scanning Cadence
- External-facing systems: Weekly or continuous
- Internal systems: Monthly minimum
- After significant changes: Immediately (new deployments, major patches, configuration changes)
- Compliance-driven: PCI-DSS requires quarterly ASV scans for external systems
Vulnerability Analysis
CVSS (Common Vulnerability Scoring System)
Standard severity rating from 0.0 to 10.0:
- Critical: 9.0–10.0
- High: 7.0–8.9
- Medium: 4.0–6.9
- Low: 0.1–3.9
CVSS includes three metric groups:
- Base: Inherent characteristics (attack vector, complexity, impact)
- Temporal: Factors that change over time (exploit maturity, patch availability)
- Environmental: Organization-specific context (asset criticality, existing mitigations)
Beyond CVSS
CVSS alone is insufficient for prioritization. Additional context:
- Exploitability: Is there a known exploit in the wild? (CISA KEV catalog)
- Asset criticality: A medium vulnerability on your internet-facing auth server matters more than a critical vulnerability on an air-gapped test machine
- Exposure: Is the vulnerable system internet-facing, internal only, or segmented?
- Business context: What’s the impact if this system is compromised?
False Positives and False Negatives
- False positive: Scanner reports a vulnerability that doesn’t actually exist. Waste of remediation effort.
- False negative: Scanner misses a real vulnerability. Dangerous.
- Validation: verify scanner findings manually or with a second tool before escalating
Vulnerability Response
Remediation
Fix the vulnerability directly.
- Patching: Apply vendor-provided update. The most common and preferred response.
- Configuration change: Disable a vulnerable feature, restrict access, tighten permissions.
- Code fix: For custom applications, fix the vulnerable code.
Mitigation
Reduce the risk without fully eliminating the vulnerability.
- Network segmentation to limit exposure
- WAF rules to block known exploit patterns
- Enhanced monitoring on the vulnerable system
- Used when patching isn’t immediately possible (legacy systems, change freeze)
Acceptance
Document the decision to accept the risk without remediation.
- Must include business justification, risk owner sign-off, and compensating controls
- Not a permanent state — review regularly
Exceptions
Formal process for granting temporary or permanent exceptions to patching requirements.
- Time-limited, documented, approved by security leadership
- Compensating controls required
Patch Management
Process
- Identification: Vendor releases patch or advisory
- Evaluation: Assess relevance, severity, and applicability to your environment
- Testing: Deploy to staging/test environment. Verify no regressions.
- Deployment: Roll out to production during maintenance window
- Validation: Verify the patch resolved the vulnerability. Re-scan.
- Documentation: Update patch records, close vulnerability tickets
Prioritization
Not all patches are equal. Prioritize by:
- Actively exploited vulnerabilities (CISA KEV)
- Internet-facing systems
- Critical CVSS with available exploits
- High-value/critical business systems
- Everything else
Challenges
- Legacy systems that can’t be patched (EOL software, ICS/SCADA)
- Application compatibility breaking after patches
- Patch availability delays from vendors
- Downtime requirements for patching critical systems
Vulnerability Reporting and Metrics
Key Metrics
- Mean Time to Remediate (MTTR): Average time from discovery to fix. Lower is better.
- Vulnerability density: Vulnerabilities per asset/system. Identifies problem areas.
- Patch compliance rate: Percentage of systems at current patch level
- Aging vulnerabilities: Count of vulnerabilities open beyond SLA (30/60/90 days)
- Scan coverage: Percentage of assets scanned. Gaps = blind spots.
Reporting
- Dashboard for security operations (real-time)
- Executive summaries for leadership (monthly/quarterly)
- Compliance reports for auditors (as required)
Offensive Context
Vulnerability management from the attacker’s perspective is a race. When a CVE is published and a patch is released, the clock starts. Attackers reverse-engineer patches to develop exploits (n-day attacks). The window between patch release and patch deployment is when most exploitation happens — not through zero-days, but through known, patched vulnerabilities that organizations haven’t applied yet. Your patch deployment speed is directly correlated with your attack surface.