Articles liés à Practical Vulnerability Management: A Strategic Approach...

Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk - Couverture souple

 
9781593279882: Practical Vulnerability Management: A Strategic Approach to Managing Cyber Risk

Synopsis

Practical Vulnerability Management shows you how to weed out system security weaknesses and squash cyber threats in their tracks.

Bugs: they're everywhere. Software, firmware, hardware -- they all have them. Bugs even live in the cloud. And when one of these bugs is leveraged to wreak havoc or steal sensitive information, a company's prized technology assets suddenly become serious liabilities.

Fortunately, exploitable security weaknesses are entirely preventable; you just have to find them before the bad guys do. Practical Vulnerability Management will help you achieve this goal on a budget, with a proactive process for detecting bugs and squashing the threat they pose.

The book starts by introducing the practice of vulnerability management, its tools and components, and detailing the ways it improves an enterprise's overall security posture. Then it's time to get your hands dirty! As the content shifts from conceptual to practical, you're guided through creating a vulnerability-management system from the ground up, using open-source software.

Along the way, you'll learn how to:

  • Generate accurate and usable vulnerability intelligence
  • Scan your networked systems to identify and assess bugs and vulnerabilities
  • Prioritize and respond to various security risks
  • Automate scans, data analysis, reporting, and other repetitive tasks
  • Customize the provided scripts to adapt them to your own needs

  • Playing whack-a-bug won't cut it against today's advanced adversaries. Use this book to set up, maintain, and enhance an effective vulnerability management system, and ensure your organization is always a step ahead of hacks and attacks.

    Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.

    À propos de l?auteur

    Andrew Magnusson has been working in the information security field since 2002, in areas ranging from firewall configuration to security consulting to managing SOC2 compliance. As a consultant deploying enterprise vulnerability management tools he has seen how an organization's vulnerability management practices, or lack thereof, affects their overall information security posture.

    Extrait. © Reproduit sur autorisation. Tous droits réservés.

    INTRODUCTION

    It’s human nature to pay attention to the problems that are big and flashy, attracting lots of interest, such as advanced persistent threat (APT) groups—state-sponsored attackers. APT-linked attackers have compromised major retailers, financial institutions, and even government networks. But when we focus all of our attention on APTs and other headline-generating activity, we miss basic issues. Even though you have new firewalls protecting your system and powerful traffic-monitoring devices, if you don’t keep up with the bread and butter of your security responsibilities, you’re leaving many chinks in your system’s armor. Neglecting the basics, like keeping your systems updated, can lead to serious consequences.

    Consider this example: suppose you’re an information security manager at a medium-sized e-commerce business. You’ve set up firewalls to block incoming traffic except for traffic to internet-facing services on systems in your demilitarized zone (DMZ). You’ve turned on egress filtering to block unauthorized exit traffic. An antivirus is on the endpoints, and you’ve hardened your servers. You believe your system is safe. 

    But an old web service is running on an outdated version of Tomcat on a Linux server in the DMZ. It’s a relic from an ill-advised foray into selling some of your company’s valuable proprietary data to selected business partners. The initiative failed, but because you made some sales, you had a contractual obligation to keep that server up for another year. At the end of the year, the project was quietly shuttered, but the server is still running. Everyone has forgotten about it. But someone on the outside notices it. An attack comes in from a compromised server in Moldova, and your unpatched Tomcat server is vulnerable to a five-year-old Java issue. Now the attacker has a foothold in your network, and all your protections couldn’t stop it. Where did you fail?

    This guide demonstrates the value of strong information security fundamentals. These are the most important components of a successful information security program. Unfortunately, they’re regularly neglected in favor of sexier topics, such as traffic analysis and automated malware sandboxing. Don’t get me wrong; these are great advances in the state of the art of information security. But without a strong grasp of the fundamentals, investment in more advanced tools and techniques is futile. 

    Who This Book Is For

    This book is for security practitioners tasked with defending their organization on a small budget and looking for ways to replicate functionality from commercially available vulnerability management tools. If you’re familiar with vulnerability management as a process, you’ll have a head start. To build your own vulnerability management system, you should be familiar with Linux and database concepts and have some experience in a programming language like Python. The scripts in this book are written in Python, but you can functionally re-create them in whichever modern scripting or programming language you prefer.

    Back to Basics

    You can consider a number of security topics as foundational, such as authentication management, network design, and asset management. Although these elements might not be exciting or interesting for an analyst to work on, they’re of critical importance. 

    Vulnerability management is one of the foundational concepts of information security. A perfectly written and configured software package doesn’t exist. Bugs are an inevitable part of software, and many bugs have security implications. Dealing with these software vulnerabilities is a perennial issue in information security; the practice of vulnerability management is required for a baseline level of security that can serve as a trusted foundation upon which to deploy more advanced and specialized tools.

    Vulnerabilities affect an organization’s IT infrastructure at all levels, so vulnerability management affects all aspects of an IT security program. Endpoint security relies on workstations and servers being up-to-date with the latest software versions to minimize the attack surface. Zero-day vulnerabilities are always a concern. But removing the low-hanging fruit of known (and sometimes long-standing) vulnerabilities makes it more difficult for attackers to compromise an endpoint and gain a foothold in your environment. Network security does its best to ensure that only necessary traffic passes among internal network segments and to and from the internet. But if systems or network devices contain known vulnerabilities, even otherwise legitimate traffic might contain network-based attacks using known and trusted protocols. Identity and access management (IAM) restricts users to the specific systems and data to which they’re entitled. But if the identity systems are vulnerable, attackers can simply sidestep them. 

    If your environment has a baseline level of security, any countermeasures you put in place can’t be easily bypassed by exploiting known vulnerabilities. Let’s consider an analogy: after World War I, France tried to protect itself from Germany by building a long line of forts and entrenchments along its German border. It was named the Maginot Line after the French minister of war. But when World War II began, the Germans ignored the barrier by simply going around it, invading France across the Belgian border instead. All of that expensive defensive infrastructure was irrelevant. The same goes for your environment. If it doesn’t have a foundational level of security, any additional countermeasures are no more than a Maginot Line. Attackers can easily avoid them because there is an easier path elsewhere. But by establishing a vulnerability management baseline and maintaining it via an active vulnerability management program, you can trust that additional security measures will add real value to your security program.

    Vulnerability Management Is Not Patch Management

    Patch management, perhaps in conjunction with a full software configuration management (SCM) system, keeps track of the versions and patch levels of servers and endpoints across an enterprise. It can push patches remotely to keep systems up-to-date. But although traditional patch management and vulnerability management (as described in this guide) share many similarities, the underlying assumptions are very different. 

    Patch management assumes that patches are available, a patch management system can manage all the devices on the network that need patches, and there is enough time and manpower to apply all patches. But in real environments, it’s very rare for all of these conditions to hold. Devices exist that aren’t managed by the SCM: for example, network devices like routers and firewalls, test machines, abandoned servers, and devices running operating systems that aren’t compatible with SCM agents. All these components are invisible to a typical SCM deployment and could easily become out-of-date without anyone noticing. Even if automated patching is practicable for endpoints, often you must handle servers and network devices manually, because automatically patching a server might lead to downtime when the organization can least afford it. On the other hand, manually patching servers and network devices takes time that overworked IT staff often can’t spare.

    Vulnerability management takes a more pragmatic approach. Instead of asking, “How can we apply all of these patches?” vulnerability management asks, “Given our limited resources, how can we best improve our security posture by addressing the most important vulnerabilities?” Vulnerability management looks at the problem through a risk management lens. We start with the full domain of vulnerabilities that exist on networked devices—managed and unmanaged—and determine which of these vulnerabilities present the highest risk to the organization’s security. Once we’ve gathered that data, we have enough information to prioritize patching and remediation activities. If after this process is complete we have the capacity to apply more updates and remediation, so much the better. But by looking at the highest-risk issues first and using our limited time and resources wisely, we can improve the system’s security posture significantly with comparatively little effort. 

    Main Topics Covered

    This technical guide is divided into two main parts: conceptual and practical. In the first part, you’ll learn about the concepts and components of the vulnerability management process. In the second and larger part, you’ll look at a practical approach to building a free or low-cost vulnerability management system. Although you can follow the guide exactly, it’s most important for you to understand the concepts behind each script to adapt it to your own needs. Toward the end of the book, you’ll explore topics you might want to tackle once your vulnerability management system is up and running. One of those topics is purchasing a commercial tool to improve your vulnerability management program when you have the budget to do so.

    Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.

    Acheter D'occasion

    état :  Satisfaisant
    Connecting readers with great books...
    Afficher cet article

    EUR 3,22 expédition vers Etats-Unis

    Destinations, frais et délais

    Acheter neuf

    Afficher cet article
    EUR 18,87

    Autre devise

    EUR 2,26 expédition vers Etats-Unis

    Destinations, frais et délais

    Résultats de recherche pour Practical Vulnerability Management: A Strategic Approach...

    Image d'archives

    Magnusson, Andrew
    Edité par No Starch Press, 2020
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Ancien ou d'occasion paperback

    Vendeur : HPB-Red, Dallas, TX, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    paperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! N° de réf. du vendeur S_409023107

    Contacter le vendeur

    Acheter D'occasion

    EUR 7,04
    Autre devise
    Frais de port : EUR 3,22
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : 1 disponible(s)

    Ajouter au panier

    Image d'archives

    Magnusson, Andrew
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Ancien ou d'occasion Couverture souple

    Vendeur : Better World Books, Mishawaka, IN, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    Etat : Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. N° de réf. du vendeur 46631330-6

    Contacter le vendeur

    Acheter D'occasion

    EUR 10,35
    Autre devise
    Frais de port : Gratuit
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : 1 disponible(s)

    Ajouter au panier

    Image d'archives

    Magnusson, Andrew
    Edité par No Starch Press, 2020
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Ancien ou d'occasion paperback

    Vendeur : Bookmans, Tucson, AZ, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    paperback. Etat : Good. . Satisfaction 100% guaranteed. N° de réf. du vendeur mon0002642389

    Contacter le vendeur

    Acheter D'occasion

    EUR 7,04
    Autre devise
    Frais de port : EUR 3,42
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : 1 disponible(s)

    Ajouter au panier

    Image d'archives

    Magnusson, Andrew
    Edité par No Starch Press, 2020
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Ancien ou d'occasion paperback

    Vendeur : Bellwetherbooks, McKeesport, PA, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    paperback. Etat : Very Good. Very Good Condition - May show some limited signs of wear and may have a remainder mark. Pages and dust cover are intact and not marred by notes or highlighting. N° de réf. du vendeur NS-PB-VG-1593279884

    Contacter le vendeur

    Acheter D'occasion

    EUR 8,65
    Autre devise
    Frais de port : EUR 3,39
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : 1 disponible(s)

    Ajouter au panier

    Image d'archives

    Magnusson, Andrew
    Edité par No Starch Press, 2020
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Ancien ou d'occasion paperback

    Vendeur : HPB-Movies, Dallas, TX, Etats-Unis

    Évaluation du vendeur 4 sur 5 étoiles Evaluation 4 étoiles, En savoir plus sur les évaluations des vendeurs

    paperback. Etat : Very Good. Connecting readers with great books since 1972! Used books may not include companion materials, and may have some shelf wear or limited writing. We ship orders daily and Customer Service is our top priority! N° de réf. du vendeur S_442977623

    Contacter le vendeur

    Acheter D'occasion

    EUR 10,59
    Autre devise
    Frais de port : EUR 3,22
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : 1 disponible(s)

    Ajouter au panier

    Image d'archives

    Magnusson, Andrew
    Edité par No Starch Press, 2020
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Ancien ou d'occasion paperback

    Vendeur : Textbooks_Source, Columbia, MO, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    paperback. Etat : Good. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes). N° de réf. du vendeur 007850515U

    Contacter le vendeur

    Acheter D'occasion

    EUR 13,22
    Autre devise
    Frais de port : EUR 3,42
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : 3 disponible(s)

    Ajouter au panier

    Image fournie par le vendeur

    Magnusson, Andrew
    Edité par No Starch Press, 2020
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Ancien ou d'occasion Couverture souple

    Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    Etat : good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers. N° de réf. du vendeur 37564810-5

    Contacter le vendeur

    Acheter D'occasion

    EUR 14,41
    Autre devise
    Frais de port : EUR 2,26
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : 3 disponible(s)

    Ajouter au panier

    Image fournie par le vendeur

    Magnusson, Andrew
    Edité par No Starch Press, 2020
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Neuf Couverture souple

    Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    Etat : New. N° de réf. du vendeur 37564810-n

    Contacter le vendeur

    Acheter neuf

    EUR 18,87
    Autre devise
    Frais de port : EUR 2,26
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : Plus de 20 disponibles

    Ajouter au panier

    Image fournie par le vendeur

    Magnusson, Andrew
    Edité par No Starch Press, 2020
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Ancien ou d'occasion Couverture souple

    Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 37564810

    Contacter le vendeur

    Acheter D'occasion

    EUR 18,88
    Autre devise
    Frais de port : EUR 2,26
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : Plus de 20 disponibles

    Ajouter au panier

    Image d'archives

    Andrew Magnusson
    ISBN 10 : 1593279884 ISBN 13 : 9781593279882
    Neuf

    Vendeur : INDOO, Avenel, NJ, Etats-Unis

    Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

    Etat : New. N° de réf. du vendeur 9781593279882

    Contacter le vendeur

    Acheter neuf

    EUR 21,21
    Autre devise
    Frais de port : Gratuit
    Vers Etats-Unis
    Destinations, frais et délais

    Quantité disponible : Plus de 20 disponibles

    Ajouter au panier

    There are 25 autres exemplaires de ce livre sont disponibles

    Afficher tous les résultats pour ce livre