Common Vulnerabilities and Exposures (CVE) – 常見漏洞和暴露
National Vulnerability Database (NVD) – 國家漏洞數據庫
Common Vulnerability Scoring System (CVSS) – 通用漏洞評分系統
CVSS 有新舊版分,CVSS V3.0分五種none Low Medium High Critical
CVSS V2.0就只有三種Low Medium High(分數範圍會考!就背 medium是4.0~6.9
vulnerability-management life cycle
Discover: Inventory all assets across the network and identify host details including operating system and open services to identify vulnerabilities. Develop a network baseline. Identify security vulnerabilities on a regular automated schedule.清點網路的所有資產
Prioritize Assets: Categorize assets into groups or business units, and assign a business value to asset groups based on their criticality to your business operation.將資產分類並給予價值
Assess: Determine a baseline risk profile so you can eliminate risks based on asset criticality, vulnerability threat, and asset classification.設定風險基準線來知道誰要先處理
Report: Measure the level of business risk associated with your assets according to your security policies. Document a security plan, monitor suspicious activity, and describe known vulnerabilities.根據安全策略紀錄、監控漏洞
Remediate: Prioritize and fix vulnerabilities in order according to business risk. Establish controls and demonstrate progress.根據優先權來開始補洞
Verify: Verify that threats have been eliminated through follow-up audits.驗證漏洞補好了
Pre-Assessment Phase預評估階段
Identify and understand business processes
Identify the applications, data, and services that support the business processes and perform code reviews
Identify the approved software, drivers, and basic configuration of each system
Create an inventory of all assets, and prioritize or rank the critical assets
Understand the network architecture and map the network infrastructure
Identify the controls already in place
Understand policy implementation and practice standard compliance with business processes
Define the scope of the assessment
Create information protection procedures to support effective planning, scheduling, coordination, and logistics
Comparing Approaches to Vulnerability Assessment比較漏洞評估方法