Site icon InfosecVidya

Vulnerability Management – Reporting

The Vulnerability Reporting is crucial in conveying information and insights in today's fast-paced world. It communicates between organizational stakeholders, providing a comprehensive overview of various activities and performance metrics. Let's talk about them.

It is the third post in the Enterprise Vulnerability Management series, Vulnerability Reporting. As usual, I have highlighted that not all suggestions here can fit every possible situation. However, fear not! We can tweak and adapt these recommendations to cater to your needs.

The Vulnerability Reporting is crucial in conveying information and insights in today’s fast-paced world. It communicates between organizational stakeholders, providing a comprehensive overview of various activities and performance metrics. When it comes to preparing and presenting reports, several key factors must be considered. Once the data has been collected, it is essential to structure the report logically and coherently. To enhance the report’s readability, we can include visual aids such as charts, graphs, and tables. These visual representations not only make the information more digestible but also help to highlight key trends, patterns, and insights.

In the preceding article, we delved into creating a well-defined scan schedule. With this present discourse, we shall focus on the crucial aspect of scan results. Following the completion of scans, the vulnerability scanning platform undertakes results processing, making them readily accessible for customers to leverage. The outcomes are conveniently furnished through a user interface (UI) and API interfaces, rendering them effortlessly consumable. Notably, in select cases, the scanning platform also offers pre-existing integrations with prominent reporting or visualization tools. Alternatively, organizations may devise their reporting mechanisms and seek integration accordingly, relying on the capabilities and available resources.

Let’s now learn about processes and reporting formats which will be helpful.

Once the report is available for consumption, the patching team starts analyzing the information and fixing the vulnerabilities, but in some scenarios, they face hurdles in applying the fix.

False Positive : Since scanning platform detection is not always fool-proof, there are chances that a vulnerability has been falsely detected on the assets. In such cases, the patch team returns to the VM team and clarifies the fixing strategy. During initial troubleshooting, we leverage the detection output, part of the report to verify why this vulnerability was detected on the asset. If it doesn’t look conclusive, we reach out to the scanning platform support group to understand under what context the platform is seeing the vulnerability and compare that with the vendor advisory. If there is conflict and it looks conclusive that the asset is unaffected, we process the exposure as a false positive. Based on the scanning platform capability, we can mark this as a false positive or include it to ignore it while creating reporting.

Exception : There are also some scenarios where the patch team can not implement a fix because of the inability to deploy patches or obtain downtime approval for installing the patch and restarting the services. Hence, they would request an exception to relax the remediation timeline. Based on the organization’s risk appetite and the vulnerability & asset exposure, the security team can review and approve the exception. The approved vulnerability can be dropped from the reporting.
This post helped to learn about the reporting aspects of the EVM process. In the next post, we will discuss another part of reporting, i.e., the Dashboard. We will also talk about how to monitor the progress and continuously make an improvement.

Exit mobile version