0% found this document useful (0 votes)
113 views

Vulnerability Scanning 101 White Paper

The document discusses vulnerability scanning best practices. It explains that vulnerability scanning identifies potential security weaknesses in a network by running automated tests. This allows organizations to prioritize and remediate any issues found before attackers can exploit them. The document provides tips for managing vulnerabilities discovered by scanning, including regularly scanning both internal and external systems, prioritizing high-risk vulnerabilities for remediation, and verifying that fixes close vulnerabilities.

Uploaded by

John Doe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views

Vulnerability Scanning 101 White Paper

The document discusses vulnerability scanning best practices. It explains that vulnerability scanning identifies potential security weaknesses in a network by running automated tests. This allows organizations to prioritize and remediate any issues found before attackers can exploit them. The document provides tips for managing vulnerabilities discovered by scanning, including regularly scanning both internal and external systems, prioritizing high-risk vulnerabilities for remediation, and verifying that fixes close vulnerabilities.

Uploaded by

John Doe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

VULNERABILITY

SCANNING 101
Best practices to secure against a data breach

© SecurityMetrics
VULNERABILITY SCANNING 101 | 1

INTRODUCTION
PCI DSS Requirement 11.2 requires organizations that store, process,
and/or transmit cardholder data electronically to run internal and
external vulnerability scans.

Vulnerability scanning is one of the easiest ways to predict how


hackers might get into your system. But vulnerability scanning isn’t
just about locating vulnerabilities in your environment; it’s about
remediating and changing your processes to ensure vulnerabilities are
addressed on a prioritized basis.

In this white paper, you will learn the basics about vulnerability
scanning, how vulnerability scanners work, how you can best
perform vulnerability scanning, and tips to manage your network
vulnerabilities.
VULNERABILITY SCANNING 101 | 2

VULNERABILITY SCANNING BASICS


WHY ARE VULNERABILITY
SCANS NECESSARY?
Based on data collected by SecurityMetrics Forensic Investigators
from last year’s breaches, it took an average of 166 days from the
time an organization was vulnerable for an attacker to compromise
the system. Once compromised, attackers had access to sensitive
data for an average of 127 days.

These system compromises can and often do lead to irreparable


brand damage and expensive data breach fines to breached organiza-
tions. Many of these compromises could have been avoided if they had
tested their environment (e.g., vulnerability scans).

Due to inherent security weakness in systems or technology, some


organizations have systems, environments, software, and/or website
weaknesses that can be exploited by attackers from the day their
environment is set up.

In other cases, an organization becomes vulnerable because they


fail to apply a security patch or make system modifications without
properly updating related security protocols.
VULNERABILITY SCANNING 101 | 3

To reduce your risk and prevent a data • Web application potentially


breach, critical vulnerabilities must be vulnerable to clickjacking: Occurs
continuously identified, prioritized, and if a remote web server does not
remediated. set an X-Frame-Options response
header in all content responses
Without regular vulnerability scanning, • SSL RC4 Cipher Suites Supported
your probability of being exploited and (i.e., Bar Mitzvah Attack):
compromised increases considerably. Exists when the RC4 encryption
This is because there are an average of algorithm is used in SSL/TLS
19 new vulnerabilities reported daily, transmission 

which can then be exploited (e.g., Heart- • SSL Self-Signed Certificate:
bleed, WannaCry, Petya). Occurs when organizations use
an identity certificate that they
For example, here were the top five create, sign, and certify rather than
failed vulnerabilities from last year that a trusted certificate authority (CA)
SecurityMetrics customers discovered
after they performed their vulnerability Often, attackers use the same vulnera-
scans: bility scanning tools that organizations
• TLS version 1.0 protocol are required to use to discover network
detection: Exists if the remote vulnerabilities.
service accepts connections using
TLS 1.0 encryption To keep ahead of attackers, you need to
• SSL certificate with wrong keep up to date on emerging vulnerabil-
hostname: Happens when a SSL ities by regularly running internal and
certificate for the tested service is external vulnerability scans.
for a different host
VULNERABILITY SCANNING 101 | 4

WHAT DOES A
VULNERABILITY SCAN DO?
A vulnerability scan is an automated, high-level test that looks for and
reports potential known vulnerabilities. For example, some vulner- Vulnerability
scanning identifies
ability scans are able to identify over 50,000 unique external and/or
internal weaknesses (i.e., different ways or methods that hackers can
exploit your network).

PCI DSS requires two independent methods of PCI scanning: internal


potential harmful
and external scanning. An external vulnerability scan is performed
outside of your network (e.g., at your network perimeter), and it
vulnerabilities,
identifies known weaknesses in network structures. An internal
vulnerability scan is performed within your network, and it looks at so that you
other hosts on the same network to identify internal vulnerabilities.
can remediate
Think of your environment as a house. External vulnerability scanning
is like checking to see if doors and windows are locked, while internal
vulnerability scanning is like testing if bedroom and bathroom doors
processes to
are locked.
ensure network
Typically, vulnerability scans generate an extensive report of found
vulnerabilities and gives references for further research on these security.
vulnerability. Some even offer directions for how to fix the problem.

Despite what many businesses believe, scanning isn’t enough. You


shouldn’t just scan and sit on the report. Act quickly on any discovered
vulnerabilities to ensure security holes are fixed, and then re-scan to
validate that vulnerabilities have been successfully addressed.
VULNERABILITY SCANNING 101 | 5

PROS OF VULNERABILITY SCANNING

Quick, high-level look at possible vulnerabilities

Very affordable compared to penetration testing

Automatic (can be automated to run weekly, monthly, quarterly)

CONS OF VULNERABILITY SCANNING

False positives

Businesses must manually check each vulnerability before testing again

Does not confirm a vulnerability is possible to exploit

VULNERABILITY SCANNING VS. PENETRATION TESTING 



Some mistakenly believe vulnerability scanning is the same thing as a
professional penetration test.

Here’s the difference: A vulnerability scan is automated, while a pene-


tration test includes a live person actually digging into your network’s
complexities. 


A vulnerability scan only identifies vulnerabilities, while a penetration


tester digs deeper to identify the root cause of the vulnerability that
allows access to secure systems or stored sensitive data.

Vulnerability scans and penetration tests work together to improve


network security. Vulnerability scans offer great weekly, monthly, or
quarterly insight into your network security, while penetration tests
offer a more thorough examination of your network security.
VULNERABILITY SCANNING 101 | 6

HOW DO VULNERABILITY
SCANNERS WORK?
Unlike antivirus software, vulnerability scanner doesn’t system versions and discovers an Windows XP operating
check every network file. Your scanner must be con- system on a workstation, it will flag the operating
figured to scan specific interfaces, such as internal system as vulnerable.
or external IP addresses (e.g., ports and services), for
vulnerabilities. Vulnerability scans are designed to be nonintrusive,
similar to a security professional checking if your front
Vulnerability scanning technology includes different door is unlocked and letting you know if it is (while not
tools and scripts designed to check for vulnerabilities. entering your environment). Vulnerability scans search
These tools can include PCI Approved Scanning your network and provides a logged summary of alerts
Vendor (ASV) operated tools, command line scripts, for you to act on. Unlike penetration testing, a vulnerabil-
GYI interfaces, open source technologies, and scanning ity scan doesn’t exploit vulnerabilities in your network.
tools (e.g., Nessus).
As you review your scan results, you may notice
Scanning tools run a series of if-then scenarios on common vulnerability and exposure (CVE) numbers in
your systems (i.e., a vulnerability scan), which typically your alerts or report. If you have questions about these
takes 1-3 hours to perform. CVE records, visit the National Vulnerability Database
to help you identify and prioritize your risks if your
These if-then scenarios should identify system settings product/vendor doesn’t offer this for you.
or actions that could lead to system exploitation. For
example, if your scan checks for outdated operating
VULNERABILITY SCANNING 101 | 7

7 TIPS TO MANAGE VULNERABILITIES


When managing your network security, a vulnerability When defining your PCI DSS scope, you should consult
management plan is vital for your organization’s security with a security professional, such as PCI DSS Qualified
and compliance efforts. Follow these 7 tips to best dis- Security Assessors (QSAs). If you don’t properly scope
cover existing and potential weaknesses in your network. your environment, your scans might overlook important
networks and what needs to be scanned to attest PCI
1. CONFIRM YOUR SCOPE compliance.

PCI DSS requires you to run vulnerability scans on


Most small organizations don’t need to worry about
in-scope networks, processes, and systems. In-scope
this issue because they typically set up a flat network
systems are directly involved in the cardholder data
(i.e., where everything inside a network can connect to
environment (CDE), meaning that the system compo-
everything else). When organizations have flat net-
nent stores, processes, or transmits cardholder data.
works, their entire network must be scanned.
The system can also be on the same network segment
as systems that deal with cardholder data.
Complex networks using segmentation to reduce their
PCI DSS scope should pay attention to how and if their
These types of systems are all part of the CDE, and
scope changes throughout the year, then adjust vulner-
they need to follow all applicable PCI DSS require-
ability scans accordingly.
ments to protect cardholder data.

Sample systems considered in-scope:


• POS devices
• Servers containing card data
• Firewalls providing segmentation of the CDE
VULNERABILITY SCANNING 101 | 8

2. RUN EXTERNAL VULNERABILITY SCANS


External scans must be performed by a PCI Approved Scanning
Vendor (ASV) to validate your PCI compliance.

An ASV is required to go through a rigorous yearly recertification


process, during which each ASV runs their PCI scanning tool on PCI
Council-approved sites riddled with vulnerabilities to test which
vulnerabilities the tool finds and/or misses.

But just because an ASV runs your external vulnerability scan, this
doesn’t mean your organization is secure. After receiving your scan
report, you’re responsible for fixing any discovered vulnerabilities and
then rescanning until vulnerabilities have been properly addressed.
VULNERABILITY SCANNING 101 | 9

3. RUN INTERNAL
VULNERABILITY SCANS
One of the biggest misconceptions with vulnerability • Purchase an internal vulnerability scanning tool
scanning is thinking that “If my ASV does my PCI scans, from your ASV or another service provider
that must mean I’m compliant.” If your ASV currently • Download an open source internal vulnerability
performs your external quarterly scans, understand scanning tool
they’re likely not handling your internal quarterly
vulnerability scanning. Keep in mind that the tool you use still needs to be
configured by a security expert after you purchase or
You may have an internal vulnerability scanning tool or download it. If you purchase a vulnerability scanning
appliance (e.g., SecurityMetrics’ Vision) set up inside tool/appliance, IT support service is typically included.
your network by your ASV, but chances are they’re not If you download scanning tools, take time to research
handling or monitoring your internal vulnerability scan- and implement configuration best practices.
ning requirements. Make sure that your internal vulner-
ability scans are actually being routinely performed. Remember, your organization is in charge of internal
vulnerability scanning from initial download/purchase,
There are a variety of tools to help you comply with configuration, actual scanning, alert analysis, to vulner-
internal vulnerability scan requirements. For example, ability management.
you can:
VULNERABILITY SCANNING 101 | 10

4. INDEPENDENT AND
QUALIFIED TESTING
Internal vulnerability scanners should be handled only
by a qualified person independent of the scanned target
(e.g., device, component, network).

Basically, the person managing your vulnerability scan-


ner should be separate from the person managing and/
or remediating any discovered vulnerabilities.

For example, if run an internal scan on your firewalls,


you can either choose a qualified security professional
(e.g., your ASV) or a qualified employee who’s not
in charge of firewall administration. Basically, if an
employee is not independent of the scanned system,
they cannot run the scan.

It doesn’t matter if you only have one IT employee


doing the job of 15 employees. If they’re not indepen-
dent from managing the system, they shouldn’t admin-
istered the scans.
VULNERABILITY SCANNING 101 | 11

5. REGULARLY RUN
VULNERABILITY SCANS
Every organization should run quarterly internal and Remember, Requirement 11.2 requires you to run at
external scans. If you only had a single target, that least four passing external vulnerability scans per year
would be eight total scans per year (i.e., one internal (i.e., one per quarter), and four passing internal vulner-
and one external scan per quarter). ability scans per year (i.e., one per quarter), and all of
your scans need to be in a passing state.
Many organizations routinely run quarterly external
vulnerability scans, but they often overlook running Many vendors allow unlimited vulnerability scanning for
internal vulnerability scans. Others think vulnerability a single target, so if you fail your first scan, make sure
scanning is an occasional spot check process, focusing to remediate your network’s vulnerabilities and then
on addressing immediate issues (e.g., WannaCry ran- re-scan until passing. You’ll likely need to run additional
somware). scans beyond your quarterly vulnerability scans.

On average, it took SecurityMetrics customers


1.68 scans and 11 days
to achieve a passing scan.
VULNERABILITY SCANNING 101 | 12

6. RUN SCANS AFTER


SIGNIFICANT NETWORK CHANGES
In addition to running your vulnerability scans quarterly, Here are some examples of significant changes:
scans need to be run after any significant change. • Adding new servers or system components
• Modifying firewall rules
What defines a significant change? A significant change
• Changing network structures
depends on how your environment is configured. But
in general, “if an upgrade or modification could allow • Altering interfaces
access to cardholder data or affect the security of the • Transferring cardholder data to a new server
cardholder data environment, then it could be consid-
• Upgrading products
ered significant.”
• Changing your firewall product
Scanning after significant changes means it should • Adding middleware (e.g., JBOSS)
happen within a reasonable timeframe. If you make • Removing/instituting new systems that store
significant changes to your system the day after your cardholder data
quarterly internal or external scan, test your changes
• Adding encryption applications
and scan that week.

Here are some examples of non-significant changes:


• Switching file integrity monitoring products
• Changing antivirus products
• Removing terminated administrative employees
from configurations
VULNERABILITY SCANNING 101 | 13

7. ESTABLISH A
TOP-DOWN APPROACH
When it comes to gaining executive support, IT depart-
ments often have trouble enforcing security-related
policies and procedures.

Your IT team needs to have executive approval and


support to perform regular vulnerability scanning and
making necessary organizational changes when vulner-
abilities are found.

Remember, your IT team would need a significant


amount of time to repair and recover from vulnerability
exploitation (i.e., a data breach), which would have a far
greater impact on your organization than the amount of
time it takes to regularly find and fix vulnerabilities.
VULNERABILITY SCANNING 101 | 14

CONCLUSION
Because cybercriminals discover new and creative ways
to hack businesses daily, it’s important to scan your
network often.

Remember, vulnerability scanning isn’t just about locat-


ing and reporting vulnerabilities. It’s also about establish-
ing a repeatable and reliable process for fixing problems.

After a vulnerability scan finishes, it’s crucial to fix any


located vulnerabilities on a prioritized basis. Start by
prioritizing vulnerabilities based on risk and required
effort; then, run scans until results are clean.

ABOUT SECURITYMETRICS
We help customers close security and compli-
ance gaps to avoid data breaches. Our forensic,
penetration testing, and audit teams identify
best security practices and simplify compliance
mandates (PCI DSS, HIPAA, HITRUST, GDPR). As
an Approved Scanning Vendor, Qualified Security
Assessor, Certified Forensic Investigator, we have
tested over 1 million systems for security.

https://www.securitymetrics.com/pci-audit

You might also like