Vulnerability Remediation: Tutorial & Best Practices

March 19, 2024
11
‎‎‏‏‎‎min

Vulnerabilities refer to security gaps or weaknesses within a system that you can leverage to undermine application availability, function integrity, or data confidentiality. An application’s attack surface encompasses all potential entry points or attack vectors that threat actors use to exploit the vulnerability. Your application’s attack surface grows in tandem with application functionality and interaction points. Attack surface growth is often multi-faceted across your organization due to the release of multiple applications by different development teams, possibly utilizing distinct programming languages and frameworks.

Poor inventory management, competing priorities, and resourcing challenges make vulnerability remediation challenging across a diverse and ever-expanding attack surface. The challenge is compounded when considering the financial implications of data breaches.

Market analysis shows that security breaches are on the rise. Attackers take advantage of high-impact vulnerabilities, frequently crafting or utilizing exploits on the same day a CVE is published. However, attackers are aware of the challenges in remediating vulnerabilities at scale and do not hesitate to leverage previously reliable exploits, especially with high-impact vulnerabilities. Therefore, you must be equipped to remediate the growing number of vulnerabilities identified by your security teams. This article explores some of the challenges, how vulnerability remediation has evolved, and the solutions and best practices you could deploy to improve your organization’s security posture. Please read our guide chapters on vulnerability management and prioritization for more context.

Summary of key vulnerability remediation concepts

Concept Description
Vulnerability severity There are two types of vulnerability severity: technical and business impact. Identification methods lack context and rely on the localized impact to determine severity. However, you must see the bigger picture and application context to prioritize remediation.
Vulnerability context Combination of
  • Likelihood and ease of exploitation
  • Technical severity
  • Data and asset stores
  • Network and authentication access
  • Opportunity for lateral movement
  • Regulatory impact
  • Cost of remediation
  • Control maintenance
It provides a more accurate representation of materialized risk impact and should be leveraged during prioritization.
Shift left in vulnerability remediation The cost of remediation increases significantly as the vulnerability gets closer to production. Organizations must implement appropriate controls as early as possible in the development lifecycle to remediate findings cost-effectively.
Vulnerability remediation process Depending on the vulnerability, remediation may involve patching, installing host updates, modifying configurations and API settings, or removing dependencies and other code changes.
Vulnerability mitigation Where remediation is impractical, mitigation looks at controls that can be implemented to deter attackers. This can be through
  • Elevating the privileges required to access the vulnerable function
  • Additional authentication controls
  • Tighter network and authorization controls
  • Data encryption
  • Web Application Firewall (WAF) rules
Vulnerability acceptance An organization may choose to accept or “live with” a vulnerability if the cost of remediation or mitigation is higher than the cost faced by exploitation, calculated from the combination of business or technical disruption and the likelihood of attack.
Preventive controls Preventive controls look to stop security incidents from happening in the first place. They are the first control to be considered when evaluating a risk.
Deterrent controls Discourage or dissuade potential attackers from targeting your systems. Examples include IDS (intrusion detection systems), security policies with clear consequences violations, security banners, etc.
Compensating controls Compensating controls are often implemented as an alternative layer of protection when preventive controls are either inadequate or infeasible.

Vulnerability remediation challenges

Vulnerability challenges revolve around the issue of multiple data sources, separate lifecycles, and silos created by teams managing vulnerabilities independently without a holistic view. Security teams deal with resource constraints both in identifying vulnerability priorities and communicating risks to business and remediation owners.

Scaling vulnerabilities

Within your environment, you’re likely facing vulnerabilities that are identified through multiple sources, such as source code, cloud components, network devices, and other assets. As vulnerability classes and numbers grow, so does the infrastructure used to identify them. Different vulnerability classes are often discovered through dedicated tooling that specializes in those classes. Acquiring a reliable understanding of your security posture becomes difficult due to the combination of multiple tools with varying vulnerability reporting formats being stitched together.

Prioritization challenges

Additional vulnerabilities are identified as your application(s) evolves and grows code base, dependencies, and resource connections, but older vulnerabilities reside in non-remediated states. It can be cumbersome to acquire a clear understanding of where you should focus your efforts. Organizations often prioritize vulnerability remediation based on technical severity. However, risk-adjusted values, relationships between vulnerabilities, and aggregate risk should also be considered. The security industry is maturing and has developed the Stakeholder-Specific Vulnerability Categorization (SSVC) to improve prioritization efforts.

Tracking risk posture

In an ideal case, remediation would be the chosen approach; however, this is not always possible in alignment with organizational risk appetite. For example, a penetration tester reports a vulnerability and determines that the severity has been underreported. Due to the resources required to deploy the fix, the security team determines that a WAF mitigation ruleset is an adequate compensating control to mitigate the risk. However, the state of this vulnerability must be tracked to ensure that it’s monitored and that risk exposure does not exceed the organization’s risk appetite.

{{banner1="/banners"}}

Approaching vulnerability remediation

Once a vulnerability has been identified, remediation is the primary goal as long as it is practical. In the past, vulnerabilities were generally focused on a single application and were the responsibility of the application security engineers. In today’s applications based on microservices and a web of interconnected APIs, it’s common to see vulnerability remediation initiatives crossing organizational boundaries leveraging a blend of software, database, site reliability engineers (SRE), and the security team.

Automated approaches

Up until recently, patching and vulnerability remediation were primarily seen as manual processes. Solutions today use automation to improve scalability so that engineers can orchestrate patching across the estate without manual intervention on an assets-per-asset basis. Analytics have enabled static source code analysis (SAST) and software composition analysis (SCA) tools to provide automatic auto-fix capabilities. Automated solutions are best suited to vulnerability classes where the remediation process is:

  • ​​Well-defined and does not require extensive codebase changes
  • Consistent between instances
  • Independent specific vulnerability circumstances
  • Evaluated to determine functionality disruption or resource availability

Examples include third-party dependencies, configuration flaws, and common coding vulnerabilities. They reduce user error across patches and ensure remediation consistency.

Manual approaches

Vulnerabilities that require an understanding of business logic, Service Level Agreements (SLA), or architecture details are generally remediated through manual intervention. In such scenarios, automated mechanisms are not mature enough to take the broader context into account and may cause issues downstream. Instead, security engineers work with relevant stakeholders to determine a fix that remediates the vulnerability but also aligns with other functional and non-functional requirements

An example could be an organization facing issues with unauthorized access due to poor verification of JSON web signatures (JWS) claims on their platform. Multiple services process the same token in this case, and verification must be consistent across the vulnerable platform. To do this, engineers collaborate and implement a single solution that can be leveraged across multiple services. They manually deploy new services or implement libraries with application programming interfaces (API) that other teams can easily integrate with.

{{banner2="/banners"}}

Vulnerability remediation best practices

Some key best practices in modern vulnerability remediation efforts are given below.

Centralize management

Large-scale vulnerability management in an enterprise environment requires a centralized view for complete context and end-to-end visibility for security teams. A centralized view is created by integrating with popular tools that discover vulnerabilities in various application environment tiers like networks, databases, and application source code.

A centralized view of vulnerabilities is required for timely remediation (source: Silk)

Centralized management allows security teams to manage vulnerabilities based on a combination of business risk and technical risk, providing a more accurate reference for remediation prioritization. Engineers can adhere to compliance standards and formulate remediation strategies more systematically.

The Silk platform allows users to maintain an end-to-end view of the vulnerability management lifecycle powered by effective and accurate vulnerability remediation prioritization.

Standardize processes

Standardizing vulnerability information across sources provides a scalable mechanism to improve security posture. A centralized location for reporting vulnerabilities allows you to follow consistent workflows for all vulnerabilities, regardless of source. Engineers can maintain consistency by standardizing how they track and report on vulnerability classes, team remediation activity, task status, and service level agreement (SLA) timelines. Some examples of rules could be as simple as ensuring that all reported vulnerabilities are tied to an asset and have a severity and an assignee assigned. More complex rules can ensure that if a vulnerability is “accepted,” it can be automatically placed in the backlog after a severity-dependent timeframe. For more concrete implementation examples, read about Silk's remediation campaigns that offer flexible automation, bulk ticketing, and custom logic.  

Enable collaboration

The vulnerability remediation process should enable collaboration between all stakeholders since system configuration changes could affect application functionality and performance. Tracking the vulnerability status is vital for scenarios where remediation requires multiple cross-system changes.

You must also assign the correct asset owners with the relevant knowledge for remediation. Silk stands out in aggregating vulnerabilities away from the identification process and associating them with issue tracking and asset owners.

{{banner3="/banners"}}

Measure progress

Metrics are vital for assessing, monitoring, and strategizing across various aspects of operations. They allow stakeholders to measure performance, make data-driven decisions, and manage risks and other resources. Some KPIs you can consider in your vulnerability remediation program include:

  • Mean time to detect (MTTD): MTTD can be defined as the duration of time between the creation of a vulnerability and its discovery. MTTD can be calculated on a case-by-case basis but is also valuable at a macro level. The equation below calculates MTTD across multiple vulnerabilities:

MTTD = (Total Sum of Detection Time) / (Total Number of Vulnerabilities)

  • Mean time to remediate (MTTR): This is often supported by a Service Level Agreement (SLA) provided to customers as part of your vulnerability management policy. Once a vulnerability’s severity has been assigned, it continues to dictate the timeframe that you use for implementing mitigation or remediation controls.
  • Average vulnerability age: In combination with MTTR, average vulnerability age is often used for tracking risk exposure due to 3rd party risk. It refers to the duration of time since a vulnerability’s public disclosure. This ensures that remediation strategies are aligned with business SLAs.
  • Rate of recurrence: The recurrence of a remediated vulnerability on an asset could potentially signal an issue with the baseline configuration. Continuously monitoring the recurrence rate allows your engineering teams to scrutinize process errors or system misconfigurations.

Prioritize high-impact remediations with asset linking

Remediation efforts often target specific vulnerabilities without addressing the underlying issues that give rise to these vulnerabilities in the first place. This isolated approach leads to an increase in vulnerabilities as application features expand, creating a bottleneck for remediation teams who must grow to keep pace with the rising number of issues and meet (MTTR) objectives.

To effectively counter this issue, it's essential for teams to uncover the fundamental causes and implement comprehensive measures to prevent them from recurring. The root cause analysis requires a knowledge of the interconnected components, including both internal assets and external elements like third-party libraries or vendors.

Silk Security offers an asset-linking feature that enables teams to gain a contextual perspective on a given vulnerability, including its cause-and-effect relevance to similar issues across the enterprise environment. Establishing and maintaining relationships between assets and vulnerabilities saves much time and effort compared to manual root cause analysis. This approach also helps the security team prioritize the remediations with the highest impact across the most critical applications.  You can learn more by reading this article about driving high-impact risk remediation with Silk Security’s application asset linking.

{{banner4="/banners"}}

Last thoughts on vulnerability remediation

The article has described the importance of a vulnerability remediation program, some of the challenges you might face, how to tackle them, and best practices you can implement going forward.

An efficient vulnerability remediation program ensures that you are taking appropriate steps to address vulnerabilities that are the most likely to affect your business negatively. It allows key stakeholders to define key performance indicators (KPI) and measure progress across the business. Additionally, it takes the dynamic nature of modern technology companies into account, by fostering collaboration between teams without creating bottlenecks.

Like this article?

Subscribe to our LinkedIn Newsletter to receive more educational content

Subscribe Now
Chapter
1

Vulnerability Management Lifecycle

Learn how to prioritize and mitigate weaknesses within an organization's IT landscape through a holistic vulnerability management program.

Read this chapter
Chapter
2

SSVC: In-Depth Tutorial

Learn how the Stakeholder-Specific Vulnerability Categorization (SSVC) is becoming the industry standard replacing the Common Vulnerability Scoring System (CVSS).

Read this chapter
Chapter
3

EPSS

Learn how to utilize the Exploit Prediction Scoring System to prioritize remedial steps and prevent vulnerability-based incidents.

Read this chapter
Chapter
4

CTEM

Learn best practices for operationalizing CTEM and incorporating asset value for enhanced threat management.

Read this chapter
Chapter
5

Threat and Vulnerability Management

Learn how to reduce your organization's attack surface with threat and vulnerability management best practices.

Read this chapter
Chapter
6

Vulnerability Management Process

Learn the best practices for implementing a sustainable vulnerability management process, including establishing clear objectives, selecting appropriate tools, maintaining historical data, and acknowledging risks.

Read this chapter
Chapter
7

Vulnerability Prioritization

Learn about the best practices, challenges, and modern models for prioritizing vulnerabilities in order to reduce risk exposure and improve overall security.

Read this chapter
Chapter
8

Vulnerability Remediation

Learn about the challenges and solutions associated with vulnerability remediation, including evolving practices and the cost of data breaches.

Read this chapter
Chapter
9

Cyber asset management

Learn best practices for successful Cybersecurity asset management, including identifying unmanaged assets, enriching inventory, and securing asset management systems as part of security infrastructure.

Read this chapter