War-Time vs. Peace-Time Vulnerability Management - banner War-Time vs. Peace-Time Vulnerability Management - feature

September 8, 2022

War-Time vs Peace-Time Vulnerability Management

In the military, you approach periods of war and peace differently.

Peace-time is used to train the troops for battle. Peace-time’s stability is used to steadily enhance assets and strategic position for future war.

When war comes, the approach is quite different. The focus turns to making rapid decisions and acting quickly on the battlefield while under fire. War-time is about facing the unknown – it’s about survival and protection.

Vulnerability management is the same. In peace-time, security teams are focused on burning down high volumes of important vulnerabilities and closing security gaps quickly and efficiently. In war-time, the attention turns to urgently identifying and deploying patches or quick mitigations to fix critical vulnerabilities before attackers can cause serious damage to the organization.

In both situations, speed is of the essence. But, because peace-time and war-time are very different in terms of the challenges, constraints and goals, security teams require distinct approaches for each. In this blog, we highlight two key concepts: Patch Prioritization and CVE Prioritization – and how they help teams work more efficiently, during peace-time and war-time.

Managing peace-time with Patch Prioritization

Patching security flaws is a challenging and never-ending task for most security professionals. This daunting task gets more difficult each year as the number of new security vulnerabilities continues to grow. To put this into perspective, the number of new CVEs reported in 2021 was 28,495 with this number expected to be even higher in 2022 (16,568 new CVEs have been reported this year)!

Traditional approaches and legacy tools are no longer able to keep up with the pace of new CVEs. Security teams typically rely on severity and threat data that supposedly identify the top vulnerabilities to remediate. While this seems like a good strategy on the surface, it tends to be cumbersome, inefficient and leads to risk accumulating over a long period of time due to a backlog of unpatched key assets.

If you are using a legacy vulnerability management solution, this is probably what your vulnerability management process looks like:

Peace-time workflow when using a legacy vulnerability management tool
Peace-time workflow when using a legacy vulnerability management tool

As you can see, this approach creates unnecessary work for IT and patching teams because they are required to apply multiple patches for the same product as they close individual vulnerabilities, despite the fact that updates for most applications today include patches for all prior vulnerabilities in addition to patches for newly identified vulnerabilities.

Patch Prioritization, a feature of the Balbix platform’s Risk-based Vulnerability Management (RBVM) capabilities, recommends the patches that most efficiently address the maximum number of open CVEs for an application in order for security teams to more effectively reduce risk. With Patch Prioritization, teams can eliminate unnecessary patching and improve their overall cybersecurity risk posture.

Balbix’s Patch Prioritization makes recommendations by considering overall risk reduction of available patches. This is accomplished by accounting for the number of vulnerabilities, severity of vulnerabilities, threat data for the vulnerabilities under consideration, and business impact of assets while minimizing the number of patches that need to be applied for a given product.

 

A Balbix screenshot of a patch prioritization project showing the estimated number of unique CVEs, CVE instances, recommended fixes and affected asset types to patch
A Balbix screenshot of a patch prioritization project showing the estimated number of unique CVEs, CVE instances, recommended fixes and affected asset types to patch

 

Balbix’s Patch Prioritization works in combination with other aspects of the Balbix RBVM solution to help with peace-time CVE remediation:

  • Balbix allows users to create remediation projects with a single click in order to easily track remediation progress for CVE patching projects related to specific asset groups, software type or vendor. To improve accountability, these projects can directly match the scope of operational teams.
  • Balbix automatically gamifies remediation to improve visibility and bottom-up ownership to drive timely remediation.
  • Balbix provides key stakeholders with automated progress reports via email on a daily, weekly, or monthly basis.
  • Balbix has real-time dashboards and progress reports to show how risk is being reduced and to highlight the value that your security program is driving for the business.

With Balbix, a peace-time risk-based patching process looks like this:

Peace-time workflow when using Balbix
Peace-time workflow when using Balbix

 

With Balbix’s RBVM solution, vulnerability management teams can supercharge their peace-time patch management program to burn through vulnerabilities faster and improve patching metrics – such as mean-time-to-patch (MTTP), mean-time-to-remediate (MTTR) – and their overall duty cycle. Ultimately, faster MTTRs coupled with risk-based prioritization result in substantially lower cyber risk.

Cyber Risk ($) vs Mean-Time-to-Mitigate Risk (in days)
Risk Reduction with Faster Risk-Based Mitigation

Managing war-time with CVE Prioritization

During war-time, critical vulnerabilities can arise out of nowhere. It can be stressful and time-consuming to deploy emergency patches, and security teams often lack the resources and visibility needed to quickly identify, triage and resolve the vulnerabilities in a timely manner.

Remember the Log4j vulnerabilities?

If you are using a legacy vulnerability tool to deploy emergency patches, your war-time patch management workflow might look something like this:

War-time workflow when using a legacy vulnerability management tool
War-time workflow when using a legacy vulnerability management tool

 

Balbix’s CVE Prioritization capabilities enables real-time prioritization of CVEs not just by CVE severity and threat level, but also by software vendor, category and many other factors. Cybersecurity professionals can scope the list of open vulnerabilities of concern in the enterprise using a wide variety of filters such as operational and business tags, threat levels, threat names and threat categories (e.g. ransomware, ongoing exploits, available exploit code etc.) and use this information to drive an efficient remediation strategy.

 

A screenshot of vulnerability tags that can be enabled within CVE Prioritization
A screenshot of vulnerability tags that can be enabled within CVE Prioritization

For our customers, CVE Prioritization has reduced the triaging effort from weeks to minutes. For each vulnerability, Balbix provides a tactical fix (a patch version that is minimally required for remediation) as well as a strategic fix (a patch that addresses the maximum number of vulnerabilities for the affected versions of software).

For example, a Fortune 100 Telco with several million assets relied on Balbix to identify all vulnerable instances of Log4j with extremely high accuracy across their enterprise environment. Using CVE Prioritization, they reduced their remediation time from several months to a short number of weeks.

 

A screenshot of CVE Prioritization showing CVEs prioritized by severity
A screenshot of CVE Prioritization showing CVEs prioritized by severity

 

CVE Prioritization works in combination with other aspects of the Balbix RBVM solution to help with war-time CVE remediation:

  • Balbix automates CVE inferencing that accurately identifies and discovers vulnerabilities, and updates dashboards within hours of CVE publication, all without requiring a vulnerability scan.
  • Balbix automatically catalogs any relevant context with customizable asset tags, for example business criticality level, owner, application, organization or business line, etc.
  • Balbix enables one-click ticketing that dispatches detailed remediation information for prioritized CVEs.

With CVE Prioritization and these additional features your war-time patch management process looks like this:

War-time workflow when using Balbix
War-time workflow when using Balbix

 

As I mentioned earlier, vulnerability management is a lot like preparing for and fighting a war. In times of peace, your security teams are focused on enhancing security posture by tackling mountains of important CVEs as efficiently as possible. But during war-time their attention is turned to taking action to quickly fix critical vulnerabilities before their organization is hit by a cyberattack.

Peace-time and war-time are very different in terms of challenges, constraints and goals, which means that security teams require distinct approaches for each. Balbix’s RBVM solution, and two unique features in particular – Patch Prioritization and CVE Prioritization – can help security teams work more efficiently in each situation. And with Balbix maximally automating your workflow, you won’t need an army!

Start your journey to a more efficient patch management program by scheduling a 30-minute demo with Balbix.