You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<p>“The focus should be given to those known to be <ahref="#vendors-qualys">exploited in the wild (<abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available</a>”</p>
5772
5772
<p><imgalt="Exploitation Known evidence or activity" src="../assets/images/threat.png" width="400" /></p>
5773
5773
<ol>
5774
-
<li>For those using <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores and Ratings, using <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> v3 Temporal Metric - Exploit Code Maturity (E) that <strong>supports Exploitation</strong> evidence is a small step with a relatively small (de)prioritization of CVEs.</li>
5774
+
<li>For those using <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores and Ratings, using <ahref="#risk-rbp_schemes-cvss-and-temporal-metric-exploit-code-maturity-e"><abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> v3 Temporal Metric - Exploit Code Maturity (E)</a> that <strong>supports Exploitation</strong> evidence is a small step with a relatively small (de)prioritization of CVEs.</li>
5775
5775
<li>Either <ahref="#risk-takeaway-cvss-base-score-ratings-with-exploitation-focus"><abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base Score Ratings with Exploitation Focus</a> or <ahref="#risk-takeaway-ssvc-decision-trees"><abbrtitle="SSVC Stakeholder-Specific Vulnerability Categorization">SSVC</abbr> Decision Trees</a>, that <ahref="#risk-understanding_risk-where-cvss-epss-cisa-kev-fit"><strong>Focus on Exploitation</strong></a>, are bigger steps, with a bigger (de)prioritization of CVEs.</li>
5776
5776
</ol>
5777
5777
<p>This can run automatically as a First Pass Triage, before additional business and runtime context is added.</p>
<h3id="risk-takeaway-refine-the-risk-based-prioritization-scheme-based-on-your-environment-and-your-data">Refine the <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization scheme based on your environment and your data.<aclass="headerlink" href="#risk-takeaway-refine-the-risk-based-prioritization-scheme-based-on-your-environment-and-your-data" title="Permanent link">¶</a></h3>
5782
5782
<ol>
5783
-
<li>Use CVEs detected in your Incident Response, Bug Bounty, PenTesting findings) to inform your <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>.</li>
5783
+
<li>Use CVEs detected in your Incident Response, Bug Bounty, PenTesting findings to inform your <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>.</li>
<li>Assess <ahref="#epss-applying_epss_to_your_environment-epss-for-your-environment"><abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> for YOUR Environment</a></li>
5786
5786
<li>Start by picking an <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> Threshold around 10%, and adjust based on your <abbrtitle="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data and your capacity to <abbrtitle="The neutralization or elimination of a vulnerability or the likelihood of its exploitation.">remediate</abbr> the CVEs above that Threshold (in conjunction with <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity or other <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> factors) per <ahref="#epss-epss_thresholds-remediation-policy-for-an-enterprise">Remediation Policy for an Enterprise</a></li>
<p>“The focus should be given to those known to be <ahref="../../vendors/Qualys/">exploited in the wild (<abbrtitle="Cybersecurity & Infrastructure Security Agency">CISA</abbr><abbrtitle="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available</a>”</p>
1560
1560
<p><imgalt="Exploitation Known evidence or activity" src="../../assets/images/threat.png" width="400" /></p>
1561
1561
<ol>
1562
-
<li>For those using <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores and Ratings, using <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> v3 Temporal Metric - Exploit Code Maturity (E) that <strong>supports Exploitation</strong> evidence is a small step with a relatively small (de)prioritization of CVEs.</li>
1562
+
<li>For those using <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores and Ratings, using <ahref="../Rbp_schemes/#cvss-and-temporal-metric-exploit-code-maturity-e"><abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> v3 Temporal Metric - Exploit Code Maturity (E)</a> that <strong>supports Exploitation</strong> evidence is a small step with a relatively small (de)prioritization of CVEs.</li>
1563
1563
<li>Either <ahref="#cvss-base-score-ratings-with-exploitation-focus"><abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Base Score Ratings with Exploitation Focus</a> or <ahref="#ssvc-decision-trees"><abbrtitle="SSVC Stakeholder-Specific Vulnerability Categorization">SSVC</abbr> Decision Trees</a>, that <ahref="../Understanding_Risk/#where-cvss-epss-cisa-kev-fit"><strong>Focus on Exploitation</strong></a>, are bigger steps, with a bigger (de)prioritization of CVEs.</li>
1564
1564
</ol>
1565
1565
<p>This can run automatically as a First Pass Triage, before additional business and runtime context is added.</p>
<h3id="refine-the-risk-based-prioritization-scheme-based-on-your-environment-and-your-data">Refine the <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization scheme based on your environment and your data.<aclass="headerlink" href="#refine-the-risk-based-prioritization-scheme-based-on-your-environment-and-your-data" title="Permanent link">¶</a></h3>
1570
1570
<ol>
1571
-
<li>Use CVEs detected in your Incident Response, Bug Bounty, PenTesting findings) to inform your <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>.</li>
1571
+
<li>Use CVEs detected in your Incident Response, Bug Bounty, PenTesting findings to inform your <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>.</li>
<li>Assess <ahref="../../epss/Applying_EPSS_to_your_environment/#epss-for-your-environment"><abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> for YOUR Environment</a></li>
1574
1574
<li>Start by picking an <abbrtitle="Exploit Prediction Scoring System">EPSS</abbr> Threshold around 10%, and adjust based on your <abbrtitle="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data and your capacity to <abbrtitle="The neutralization or elimination of a vulnerability or the likelihood of its exploitation.">remediate</abbr> the CVEs above that Threshold (in conjunction with <abbrtitle="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity or other <abbrtitle="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> factors) per <ahref="../../epss/EPSS_Thresholds/#remediation-policy-for-an-enterprise">Remediation Policy for an Enterprise</a></li>
0 commit comments