Vulnerability Scanning 101 White Paper
Vulnerability Scanning 101 White Paper
SCANNING 101
Best practices to secure against a data breach
© SecurityMetrics
VULNERABILITY SCANNING 101 | 1
INTRODUCTION
PCI DSS Requirement 11.2 requires organizations that store, process,
and/or transmit cardholder data electronically to run internal and
external vulnerability scans.
In this white paper, you will learn the basics about vulnerability
scanning, how vulnerability scanners work, how you can best
perform vulnerability scanning, and tips to manage your network
vulnerabilities.
VULNERABILITY SCANNING 101 | 2
WHAT DOES A
VULNERABILITY SCAN DO?
A vulnerability scan is an automated, high-level test that looks for and
reports potential known vulnerabilities. For example, some vulner- Vulnerability
scanning identifies
ability scans are able to identify over 50,000 unique external and/or
internal weaknesses (i.e., different ways or methods that hackers can
exploit your network).
False positives
HOW DO VULNERABILITY
SCANNERS WORK?
Unlike antivirus software, vulnerability scanner doesn’t system versions and discovers an Windows XP operating
check every network file. Your scanner must be con- system on a workstation, it will flag the operating
figured to scan specific interfaces, such as internal system as vulnerable.
or external IP addresses (e.g., ports and services), for
vulnerabilities. Vulnerability scans are designed to be nonintrusive,
similar to a security professional checking if your front
Vulnerability scanning technology includes different door is unlocked and letting you know if it is (while not
tools and scripts designed to check for vulnerabilities. entering your environment). Vulnerability scans search
These tools can include PCI Approved Scanning your network and provides a logged summary of alerts
Vendor (ASV) operated tools, command line scripts, for you to act on. Unlike penetration testing, a vulnerabil-
GYI interfaces, open source technologies, and scanning ity scan doesn’t exploit vulnerabilities in your network.
tools (e.g., Nessus).
As you review your scan results, you may notice
Scanning tools run a series of if-then scenarios on common vulnerability and exposure (CVE) numbers in
your systems (i.e., a vulnerability scan), which typically your alerts or report. If you have questions about these
takes 1-3 hours to perform. CVE records, visit the National Vulnerability Database
to help you identify and prioritize your risks if your
These if-then scenarios should identify system settings product/vendor doesn’t offer this for you.
or actions that could lead to system exploitation. For
example, if your scan checks for outdated operating
VULNERABILITY SCANNING 101 | 7
But just because an ASV runs your external vulnerability scan, this
doesn’t mean your organization is secure. After receiving your scan
report, you’re responsible for fixing any discovered vulnerabilities and
then rescanning until vulnerabilities have been properly addressed.
VULNERABILITY SCANNING 101 | 9
3. RUN INTERNAL
VULNERABILITY SCANS
One of the biggest misconceptions with vulnerability • Purchase an internal vulnerability scanning tool
scanning is thinking that “If my ASV does my PCI scans, from your ASV or another service provider
that must mean I’m compliant.” If your ASV currently • Download an open source internal vulnerability
performs your external quarterly scans, understand scanning tool
they’re likely not handling your internal quarterly
vulnerability scanning. Keep in mind that the tool you use still needs to be
configured by a security expert after you purchase or
You may have an internal vulnerability scanning tool or download it. If you purchase a vulnerability scanning
appliance (e.g., SecurityMetrics’ Vision) set up inside tool/appliance, IT support service is typically included.
your network by your ASV, but chances are they’re not If you download scanning tools, take time to research
handling or monitoring your internal vulnerability scan- and implement configuration best practices.
ning requirements. Make sure that your internal vulner-
ability scans are actually being routinely performed. Remember, your organization is in charge of internal
vulnerability scanning from initial download/purchase,
There are a variety of tools to help you comply with configuration, actual scanning, alert analysis, to vulner-
internal vulnerability scan requirements. For example, ability management.
you can:
VULNERABILITY SCANNING 101 | 10
4. INDEPENDENT AND
QUALIFIED TESTING
Internal vulnerability scanners should be handled only
by a qualified person independent of the scanned target
(e.g., device, component, network).
5. REGULARLY RUN
VULNERABILITY SCANS
Every organization should run quarterly internal and Remember, Requirement 11.2 requires you to run at
external scans. If you only had a single target, that least four passing external vulnerability scans per year
would be eight total scans per year (i.e., one internal (i.e., one per quarter), and four passing internal vulner-
and one external scan per quarter). ability scans per year (i.e., one per quarter), and all of
your scans need to be in a passing state.
Many organizations routinely run quarterly external
vulnerability scans, but they often overlook running Many vendors allow unlimited vulnerability scanning for
internal vulnerability scans. Others think vulnerability a single target, so if you fail your first scan, make sure
scanning is an occasional spot check process, focusing to remediate your network’s vulnerabilities and then
on addressing immediate issues (e.g., WannaCry ran- re-scan until passing. You’ll likely need to run additional
somware). scans beyond your quarterly vulnerability scans.
7. ESTABLISH A
TOP-DOWN APPROACH
When it comes to gaining executive support, IT depart-
ments often have trouble enforcing security-related
policies and procedures.
CONCLUSION
Because cybercriminals discover new and creative ways
to hack businesses daily, it’s important to scan your
network often.
ABOUT SECURITYMETRICS
We help customers close security and compli-
ance gaps to avoid data breaches. Our forensic,
penetration testing, and audit teams identify
best security practices and simplify compliance
mandates (PCI DSS, HIPAA, HITRUST, GDPR). As
an Approved Scanning Vendor, Qualified Security
Assessor, Certified Forensic Investigator, we have
tested over 1 million systems for security.
https://www.securitymetrics.com/pci-audit