Facebook Google Plus Twitter LinkedIn YouTube RSS The Menu The Search The Resource - a Blog The Resource - Webinar The Resource - Report The Resource - the Event icons_066 icons_067 icons_068 icons_069 icons_070

Tenable blog

To subscribe to
  • Twitter
  • Facebook
  • LinkedIn

Risk management: reduce the risk of modern attack surface

How to use the risk management, reduce the risk of network security

The face of invalid and fragmented safety plan, a large number of single point tool to generate data scattered and lack of insight, many network security team is in trouble.In this article, we will explain why they need a risk exposure management platform to provide comprehensive visibility, and help their projected threat, an analysis of the priority repair and reduce risk.

With clearly defined local boundary IT environment has stepped onto the rotary dial telephone.What are the reasons?The following is a list of some common related assets: cloud, mobile technology, software delivery capacity, the IoT and over the past few years a variety of other modern technologies and processes.

As a result, IT environment is becoming more and more complex, scattered and mixed and more loosely, make IT difficult to be effectively protected.Attack surface expanding and more complicated, for cyber criminals provides a number of available loopholes and blind spots.

World changes with each passing day, the network security team will continue to get into trouble, but also the face of invalid and fragmented safety plan, a large number of single point tool to continually produce a large number of scattered data, and these data are often not easy to form associations, also it is difficult to draw a meaningful insights.

What should I do?Might as well try the risk management

With the development of the IT environment and become more complex, protect all kinds of tools and techniques needed for the assets and in the same change.Vulnerability management has played a tremendous effect, can let us better understand the traditional IT assets (such as servers, workstations, or network equipment) of the security situation.However, to the cloud platform, micro services, Web application, the operation technology equipment and identity service transition needs more and more specialized tools, and these tools can be safely and correctly evaluate each kind of technology, to determine the possible risks to the enterprise.

Risk management is the modern version of this fragmented evaluation methods, this method can be every assessment tools, and techniques of data collection and analyzed together, to see the evaluation results, the relationship between the let companies know may suffer from the real situation in the field of attack.Because the attackers usually from one type of vulnerability to another type of loopholes, therefore, the defender must be able to understand their own how all bugs and errors configuration data will influence each other.This relationship centered aggregate analysis has traditionally been done manually in the external data storage, among them, the risk of a security team must create relationships, and make use of their personal understanding of infrastructure for analysis.This leads to the environmental view of incomplete, and the process of trying to solve this problem very slow and difficult.

The sticky situation has a solution: beyond the traditional vulnerability management risk management plan, including across a range of assets and configuration problems in technology, vulnerabilities and attack path data, including identity solutions, configuration, and deployment of cloud and Web applications.

Risk management plan is the basis of the technology platform and understanding, response and repair processes needed for the risk exposure, and make the enterprise to be able to:

  • Get the entire modern attack the full visibility
  • Predicting threat to attack prevention priority analysis
  • Network security risk in order to make better decisions

Risk management: reduce the risk of modern attack surface, figure 1 a

What kind of risk management of enterprise need?

The following questionnaire to help determine whether to need to adopt risk management plan:

  • Security tools can interoperate in the stack, and the risk exposure to provide comprehensive insight?
  • Whether to attack surface to obtain comprehensive visibility, including from the endpoint to the cloud, and then to the local environment, as well as any area between each other?
  • Can at any time by way of predicting priority analysis was carried out on the repair work, to understand what work needs priority at any time?
  • Use of intelligence to understand threat situation?
  • Whether assets are most critical to all may result in cyber criminals into attack path analysis?
  • Whether to meet or exceed the industry benchmark way to fix the problem timely, accurate, and last?
  • Can be confident and authority to answer the following question: "how safe are we?"
  • Whether to the business management and security team clearly communicate safety status?
  • Security team of resource allocation decisions on the basis of the data?

If you are looking for all or most of the questions to answer is "no", then USES the risk management has great could benefit.

The main advantage

Comprehensive risk management program can help all kinds of stakeholders.The following is a risk management plan for the benefits of three types of key groups.

  • Security professionals

    • To attack surface has the complete comprehensive visibility and understanding
    • All assets of unified view, no longer is absent
    • For all types of vulnerability and risk exposure for precise analysis of the fixed priority
    • Clearly establish effective risk management of the baseline
    • Improved risk decision
  • The security manager

    • Comprehensive insight into and privilege of threats, assets, and context
    • Reduce the risk and repair and response for resources
    • Through the assets in the attack surface and user context view forecast attack consequences
    • Clear and easy to communicate key performance indicators (KPI), to follow up the progress over a period of time and comparing with the benchmark
  • CISO, business information security officer (BISO) and other safety executives

    • Accurate risk assessment, to improve decisions about investment and insurability, meet compliance requirements, and promote enterprise to improve
    • Operational metrics to help measure, compare, and to IT and security team and non-technical managers and operations teams to communicate network security risk
    • With a clear KPI unified view of network security risk, to measure progress, and with the industry and enterprise internal benchmark comparison
    • To answer the following question: "how safe are we?"

In the risk management platform need to pay attention to three things

Effective risk management platform need to provide three key features:

Comprehensive visibility

In order to achieve rapid and smooth understanding and management of the network security risk of the enterprise and its complete attack surface, and eliminate the blind spot, the platform must provide the following functions:

  • Either locally or in the cloud, for all assets and related software bugs, configuration, loopholes and provide a unified view of vulnerability of authority
  • Continuous monitoring of the Internet, in order to rapidly detect and identify all external oriented assets, eliminating the security risks of known and unknown area

Forecast and the analysis of priority

In order to help the security team to anticipate the consequences of network attacks, its action is priority analysis, and to reduce risk to a minimum of effort, the platform must provide the following functions:

  • Use a variety of single point tool to provide large data sets, provide relevant attack path related assets, risk exposure, the privileges and the context of threat
  • Continued recognition and attention by the attacker using are at greatest risk of attack path
  • To provide accurate predictive repair guidance and insight

Effective measure of network security risk

To provide safety management personnel, and business leaders with a centralized view, in accordance with the business of network security risk, and provide the clear KPI, let them to be reference to the risk management ability for test, the platform must provide the following functions:

  • To the overall network security risk of the enterprise to provide actionable insights, including the value of active work every day
  • Enable users to understand each department, business unit, location, type of technology or any other form of business operation details
  • To help improve the business enterprise inside the whole communication and collaboration between different groups
  • Provide operational indicators, to help save time, improve the investment decision-making, support network insurance plan, promote the improvement, at the same time to reduce risk

Tenable can bring what

Today, Tenable introduced Tenable One exposure management platform.The platform to various data sources and unified view of a single exposure, designed to help companies gain visibility and priority analysis was carried out on the work and communicate network security risk.

Tenable One based on the proven Tenable product, different holes, errors, security configuration, and other integrated into a single view, will all find that the risk of problem context unify in together, and risk of the enterprise is the most serious areas provided based on the understanding of the context.So, can let enterprise fair to weigh the missing patches, SQL injection vulnerability and risk between misconfiguration container size, which a risk to the business and understand the potential impact of a larger.With the help of a Tenable One, the enterprise can make full use of between Tenable and its partners, such as ServiceNow existing integration.The platform also aims to lay the foundation for risk management program, and other security tools for most of the enterprises have implemented ramming foundation, processes and services.

For details

Related articles

    You can take advantage of the network security news

    Enter your email, never miss the Tenable experts timely warning and safety instruction.

    Tenable Vulnerability Management,

    Formerly known as Tenable. IO


    Can fully access modern vulnerability management platform based on cloud, thus found with unparalleled accuracy and tracking of all assets.

    Tenable Vulnerability Management trial version also includes Tenable Lumin, Tenable Web App Scanning and Tenable Cloud Security.

    Tenable Vulnerability Management,

    Formerly known as Tenable. IO

    Can fully access modern vulnerability management platform based on cloud, thus found with unparalleled accuracy and tracking of all assets.Immediately purchase the annual subscription.

    65An asset

    Choose your subscription options:

    Buy now

    Free trial Tenable Nessus Professional

    A free trial for 7 days

    Tenable Nessus is the most comprehensive vulnerability scanner features on the market today.

    New - Tenable Nessus Expert
    Do not use

    Nessus Expert added more features, including external attack surface scan, and add the domain and the scanning function of cloud infrastructure.Click here to try Nessus Expert.

    Fill out the form below to continue to try Nessus Pro.

    Buy Tenable Nessus Professional

    Tenable Nessus is the most comprehensive vulnerability scanner features on the market today.Tenable NessusProfessional 可帮助自动化漏洞扫描流程、节省合规周期的时间,并调动起 IT 团队的积极性。

    Buy multi-year license, namely, premium support function is added to enjoy preferential prices for 365 days a year, 24 hours a day in the phone, chat and support community.

    Select your license

    Buy multi-year license that enjoy preferential price

    Add support and training

    Tenable. IO

    Can fully access modern vulnerability management platform based on cloud, thus found with unparalleled accuracy and tracking of all assets.

    Tenable Vulnerability Management trial version also includes Tenable Lumin, Tenable Web App Scanning and Tenable Cloud Security.

    Tenable. IO buy

    Can fully access modern vulnerability management platform based on cloud, thus found with unparalleled accuracy and tracking of all assets.Immediately purchase the annual subscription.

    65An asset

    Choose your subscription options:

    Buy now

    Trial Tenable Web App Scanning

    Formerly known as Tenable. IO Web Application Scanning

    You can through the Tenable One full access to our risk management platform designed for modern applications tailor-made Web application scan latest product.Is safe to scan all online portfolio, with high accuracy, and without heavy manual operation or interrupt key Web application.Register now.

    Tenable Web App Scanning trial version also includes Tenable Vulnerability Management, Tenable Lumin and Tenable Cloud Security.

    Buy Tenable Web App Scanning

    Formerly known as Tenable. IO Web Application Scanning

    Can fully access modern vulnerability management platform based on cloud, thus found with unparalleled accuracy and tracking of all assets.Immediately purchase the annual subscription.

    5 A FQDN

    The $3578

    Buy now

    The trial Tenable Lumin

    Use Tenable Lumin intuitive present management and explore your exposure, lower risk tracking status for a long time, and in the same industry benchmarks to measure were analyzed.

    Tenable Lumin trial version also includes Tenable Vulnerability Management, Tenable Web App Scanning and Tenable Cloud Security.

    Buy Tenable Lumin

    Contact the sales representatives, Tenable Lumin insight into how to help you to get the whole enterprise and manage network security risks.

    The trial Tenable Cloud Security

    Formerly known as Tenable. Cs

    For error detection and repair of cloud infrastructure configuration, and view the full access runtime loopholes.Register now, free trial.To understand the detailed information about the trial process, please click here.

    Tenable Cloud Security trial version also includes Tenable Vulnerability Management, Tenable Lumin and Tenable Web App Scanning.

    Contact the sales representative to buy Tenable Cloud Security

    Contact the sales representatives, the Tenable Cloud Security for more information, and how to join your Cloud account easily, and in a few minutes for Cloud misconfiguration and vulnerabilities of visibility.

    Free trial Tenable Nessus Expert

    A free trial for 7 days

    Nessus Expert for modern attack surface and bespoke, can view more information, protect the enterprise from holes from IT to the cloud.

    There has been a Tenable Nessus Professional?
    Upgrade to the Nessus Expert, 7 day free trial.

    Buy Tenable Nessus Expert

    Nessus Expert for modern attack surface and bespoke, can view more information, protect the enterprise from holes from IT to the cloud.

    Select your license

    Buy license for many years, save more.

    Add support and training

    Free trial Nessus Expert

    A free trial for 7 days

    Nessus Expert for modern attack surface and bespoke, can view more information, protect the enterprise from holes from IT to the cloud.

    There has been a Nessus Professional?
    A free upgrade to the Nessus Expert to 7 days.

    Buy Tenable Nessus Expert

    Nessus Expert for modern attack surface and bespoke, can view more information, protect the enterprise from holes from IT to the cloud.

    Select your license

    Buy license for many years, save more.

    Add support and training

    Baidu
    map