Vulnerabilities / Threats
6/21/2013
07:20 AM
John H. Sawyer
John H. Sawyer
Quick Hits
50%
50%

Analyzing Vulnerabilities In Business-Critical Applications

Fears of downtime and broken apps complicate the vulnerability scanning process. Here are some tips to help

[The following is excerpted from "Analyzing Vulnerabilities In Business-Critical Applications," a new report posted this week on Dark Reading's Vulnerability Management Tech Center.]

There are two primary reasons the process of scanning and patching critical systems gets shot down by management. The first is that security teams are very often seen as the bad guys who make it harder for the rest of the organization to conduct day-to-day business.

The second reason is closely tied to the first: Security is not typically at the top of C-level executives' list of priorities. Making the case to management and other groups for regular scanning and patching is easily undermined by the security department's image as a bunch of heavy-handed control freaks who want to disable everything.

The reputation of the security team within an organization affects many things -- especially when it comes to interacting with the systems responsible for making the business run and, ultimately, profit.

In the past, it has often taken a breach for a company to sit up and realize it should have been focusing more on security all along. The attitudes toward security and its importance are changing, fortunately, but to be successful, security needs to put down the big stick it has been trying to use to further its agenda. Security departments need to open up the channels of communication and work much more closely with the operations team and stakeholders responsible for mission-critical applications.

These efforts should focus on understanding the concerns of business, the ins and outs of the systems in question, and the impact that vulnerability scanning and patching can have.

Sounds easy, right? It isn't. Security teams need to understand more fully the target systems they want to test. There's much more involved than simply running a vulnerability scanner like Nessus or Nexpose, finding that patches are missing, and then telling the asset owners they need to get those patches installed or they'll be hacked.

These mission-critical applications and services are likely to be unsupported due to customization during implementation. And Web applications may contain deep logic flaws that scanners are unable to detect. In addition, there may be certain times of the day, month or even year when these systems are even more critical to the organization and when there's even less tolerance for the chance of downtime.

"Folks sometimes forget that if you are testing an app, you need to check for specific blackout dates or windows that might occur on certain days where especially sensitive transactions occur, like end-of-the-month payroll on an accounting system," says Vinnie Liu, managing partner for security consulting firm Stach & Liu. "It's an easy one to overlook because most people just focus [testing] either during business hours or off-business hours."

Starting a conversation about vulnerability scanning is the first step in bridging the gap between security and the rest of the business.

It's important for security professionals to be very clear about why vulnerability scanning is needed and what the process involves. Indeed, the discussion between security pros and business stakeholders should include an explanation of what takes place from the beginning to the end so there are no questions.

This is an opportunity for security to educate operations management and application owners so that they understand the process and different methods that can be used during vulnerability discovery. Each side can discuss the potential issues that may come up and work together to make sure that scanning will have as little impact on services as possible.

To learn more steps in streamlining the vulnerability scanning process for critical applications, download the free report.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?