Skip to content

Commit d6f9cd5

Browse files
committed
Deployed 59f098c with MkDocs version: 1.5.3
1 parent 0ec6046 commit d6f9cd5

4 files changed

Lines changed: 45 additions & 3 deletions

File tree

print_page/index.html

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5683,7 +5683,15 @@ <h2 id="risk-rbp_schemes-risk-based-prioritization-summary-against-requirements"
56835683
</div>
56845684
<div class="admonition success">
56855685
<p class="admonition-title">Takeaways</p>
5686+
<h3 id="risk-takeaway-prioritize-vulnerabilities-by-exploitation-to-reduce-cost-and-risk">Prioritize vulnerabilities by Exploitation to Reduce Cost and <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr><a class="headerlink" href="#risk-takeaway-prioritize-vulnerabilities-by-exploitation-to-reduce-cost-and-risk" title="Permanent link">&para;</a></h3>
5687+
<p>Only about 5% or fewer of all <a href="#risk-understanding_risk-what-vulnerabilities-are-being-exploited">CVEs have been exploited</a>.</p>
5688+
<p>Prioritizing vulnerabilities that are being exploited in the wild, or are more likely to be exploited, reduces the</p>
5689+
<ul>
5690+
<li>cost of vulnerability management</li>
5691+
<li>risk by reducing the time adversaries have access to vulnerable systems they are trying to exploit </li>
5692+
</ul>
56865693
<h3 id="risk-takeaway-use-a-risk-based-prioritization-scheme-that-supports-exploitation-evidence-and-likelihood-of-exploitation-epss">Use a <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Scheme that supports Exploitation Evidence and Likelihood Of Exploitation (<abbr title="Exploit Prediction Scoring System">EPSS</abbr>)<a class="headerlink" href="#risk-takeaway-use-a-risk-based-prioritization-scheme-that-supports-exploitation-evidence-and-likelihood-of-exploitation-epss" title="Permanent link">&para;</a></h3>
5694+
<p>“The focus should be given to those known to be <a href="#vendors-qualys">exploited in the wild (<abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available</a></p>
56875695
<p><img alt="Exploitation Known evidence or activity" src="../assets/images/threat.png" width="400" /></p>
56885696
<ol>
56895697
<li>For those using <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores and Ratings, using <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> v3 Temporal Metric - Exploit Code Maturity (E) that <strong>supports Exploitation</strong> evidence is a small step with a relatively small (de)prioritization of CVEs.</li>
@@ -5696,7 +5704,11 @@ <h3 id="risk-takeaway-use-a-risk-based-prioritization-scheme-that-supports-explo
56965704
<h3 id="risk-takeaway-refine-the-risk-based-prioritization-scheme-based-on-your-environment-and-your-data">Refine the <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization scheme based on your environment and your data.<a class="headerlink" href="#risk-takeaway-refine-the-risk-based-prioritization-scheme-based-on-your-environment-and-your-data" title="Permanent link">&para;</a></h3>
56975705
<ol>
56985706
<li>Use CVEs detected in your Incident Response, Bug Bounty, PenTesting findings) to inform your <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>.</li>
5699-
<li>Start by picking an <abbr title="Exploit Prediction Scoring System">EPSS</abbr> Threshold around 10%, and adjust based on your <abbr title="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data and your capacity to <abbr title="The neutralization or elimination of a vulnerability or the likelihood of its exploitation.">remediate</abbr> the CVEs above that Threshold (in conjunction with <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity or other <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> factors) per [Remediation Policy for an Enterprise](../epss/EPSS_Thresholds.md#remediation-policy-for-an-enterprise</li>
5707+
<li>For <abbr title="Exploit Prediction Scoring System">EPSS</abbr>:<ol>
5708+
<li>Assess <a href="#risk-epss-applying_epss_to_your_environment-epss-for-your-environment"><abbr title="Exploit Prediction Scoring System">EPSS</abbr> for YOUR Environment</a></li>
5709+
<li>Start by picking an <abbr title="Exploit Prediction Scoring System">EPSS</abbr> Threshold around 10%, and adjust based on your <abbr title="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data and your capacity to <abbr title="The neutralization or elimination of a vulnerability or the likelihood of its exploitation.">remediate</abbr> the CVEs above that Threshold (in conjunction with <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity or other <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> factors) per <a href="#epss-epss_thresholds-remediation-policy-for-an-enterprise">Remediation Policy for an Enterprise</a></li>
5710+
</ol>
5711+
</li>
57005712
</ol>
57015713
<h3 id="risk-takeaway-be-careful-with-proprietary-risk-based-prioritization-schemes">Be Careful with Proprietary <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Schemes<a class="headerlink" href="#risk-takeaway-be-careful-with-proprietary-risk-based-prioritization-schemes" title="Permanent link">&para;</a></h3>
57025714
<p>If you <strong>implement</strong> a proprietary <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization scheme, keep the following in mind:</p>

risk/Takeaway/index.html

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1275,6 +1275,15 @@
12751275
</label>
12761276
<ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
12771277

1278+
<li class="md-nav__item">
1279+
<a href="#prioritize-vulnerabilities-by-exploitation-to-reduce-cost-and-risk" class="md-nav__link">
1280+
<span class="md-ellipsis">
1281+
Prioritize vulnerabilities by Exploitation to Reduce Cost and Risk
1282+
</span>
1283+
</a>
1284+
1285+
</li>
1286+
12781287
<li class="md-nav__item">
12791288
<a href="#use-a-risk-based-prioritization-scheme-that-supports-exploitation-evidence-and-likelihood-of-exploitation-epss" class="md-nav__link">
12801289
<span class="md-ellipsis">
@@ -1441,6 +1450,15 @@
14411450
</label>
14421451
<ul class="md-nav__list" data-md-component="toc" data-md-scrollfix>
14431452

1453+
<li class="md-nav__item">
1454+
<a href="#prioritize-vulnerabilities-by-exploitation-to-reduce-cost-and-risk" class="md-nav__link">
1455+
<span class="md-ellipsis">
1456+
Prioritize vulnerabilities by Exploitation to Reduce Cost and Risk
1457+
</span>
1458+
</a>
1459+
1460+
</li>
1461+
14441462
<li class="md-nav__item">
14451463
<a href="#use-a-risk-based-prioritization-scheme-that-supports-exploitation-evidence-and-likelihood-of-exploitation-epss" class="md-nav__link">
14461464
<span class="md-ellipsis">
@@ -1517,7 +1535,15 @@ <h1 id="takeaway">Takeaway<a class="headerlink" href="#takeaway" title="Permanen
15171535
</div>
15181536
<div class="admonition success">
15191537
<p class="admonition-title">Takeaways</p>
1538+
<h3 id="prioritize-vulnerabilities-by-exploitation-to-reduce-cost-and-risk">Prioritize vulnerabilities by Exploitation to Reduce Cost and <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr><a class="headerlink" href="#prioritize-vulnerabilities-by-exploitation-to-reduce-cost-and-risk" title="Permanent link">&para;</a></h3>
1539+
<p>Only about 5% or fewer of all <a href="../Understanding_Risk/#what-vulnerabilities-are-being-exploited">CVEs have been exploited</a>.</p>
1540+
<p>Prioritizing vulnerabilities that are being exploited in the wild, or are more likely to be exploited, reduces the</p>
1541+
<ul>
1542+
<li>cost of vulnerability management</li>
1543+
<li>risk by reducing the time adversaries have access to vulnerable systems they are trying to exploit </li>
1544+
</ul>
15201545
<h3 id="use-a-risk-based-prioritization-scheme-that-supports-exploitation-evidence-and-likelihood-of-exploitation-epss">Use a <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Scheme that supports Exploitation Evidence and Likelihood Of Exploitation (<abbr title="Exploit Prediction Scoring System">EPSS</abbr>)<a class="headerlink" href="#use-a-risk-based-prioritization-scheme-that-supports-exploitation-evidence-and-likelihood-of-exploitation-epss" title="Permanent link">&para;</a></h3>
1546+
<p>“The focus should be given to those known to be <a href="../../vendors/Qualys/">exploited in the wild (<abbr title="Cybersecurity &amp; Infrastructure Security Agency">CISA</abbr> <abbr title="Known Exploited Vulnerability">KEV</abbr>), those with a high likelihood of exploitation (indicated by a high <abbr title="Exploit Prediction Scoring System">EPSS</abbr> score), and those with weaponized exploit code available</a></p>
15211547
<p><img alt="Exploitation Known evidence or activity" src="../../assets/images/threat.png" width="400" /></p>
15221548
<ol>
15231549
<li>For those using <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Scores and Ratings, using <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> v3 Temporal Metric - Exploit Code Maturity (E) that <strong>supports Exploitation</strong> evidence is a small step with a relatively small (de)prioritization of CVEs.</li>
@@ -1530,7 +1556,11 @@ <h3 id="use-a-risk-based-prioritization-scheme-that-supports-exploitation-eviden
15301556
<h3 id="refine-the-risk-based-prioritization-scheme-based-on-your-environment-and-your-data">Refine the <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization scheme based on your environment and your data.<a class="headerlink" href="#refine-the-risk-based-prioritization-scheme-based-on-your-environment-and-your-data" title="Permanent link">&para;</a></h3>
15311557
<ol>
15321558
<li>Use CVEs detected in your Incident Response, Bug Bounty, PenTesting findings) to inform your <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr>.</li>
1533-
<li>Start by picking an <abbr title="Exploit Prediction Scoring System">EPSS</abbr> Threshold around 10%, and adjust based on your <abbr title="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data and your capacity to <abbr title="The neutralization or elimination of a vulnerability or the likelihood of its exploitation.">remediate</abbr> the CVEs above that Threshold (in conjunction with <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity or other <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> factors) per [Remediation Policy for an Enterprise](../epss/EPSS_Thresholds.md#remediation-policy-for-an-enterprise</li>
1559+
<li>For <abbr title="Exploit Prediction Scoring System">EPSS</abbr>:<ol>
1560+
<li>Assess <a href="../epss/Applying_EPSS_to_your_environment/#epss-for-your-environment"><abbr title="Exploit Prediction Scoring System">EPSS</abbr> for YOUR Environment</a></li>
1561+
<li>Start by picking an <abbr title="Exploit Prediction Scoring System">EPSS</abbr> Threshold around 10%, and adjust based on your <abbr title="CVE Common Vulnerability and Exposures. A standardized list of publicly known vulnerabilities and exposures maintained by the MITRE Corporation.">CVE</abbr> data and your capacity to <abbr title="The neutralization or elimination of a vulnerability or the likelihood of its exploitation.">remediate</abbr> the CVEs above that Threshold (in conjunction with <abbr title="Common Vulnerability Scoring System Standard. A framework for scoring the severity of vulnerabilities based on factors such as exploitability and impact.">CVSS</abbr> Severity or other <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> factors) per <a href="../../epss/EPSS_Thresholds/#remediation-policy-for-an-enterprise">Remediation Policy for an Enterprise</a></li>
1562+
</ol>
1563+
</li>
15341564
</ol>
15351565
<h3 id="be-careful-with-proprietary-risk-based-prioritization-schemes">Be Careful with Proprietary <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization Schemes<a class="headerlink" href="#be-careful-with-proprietary-risk-based-prioritization-schemes" title="Permanent link">&para;</a></h3>
15361566
<p>If you <strong>implement</strong> a proprietary <abbr title="The likelihood of a vulnerability being exploited and the potential impact of such an exploit on an organization.">Risk</abbr> Based Prioritization scheme, keep the following in mind:</p>

search/search_index.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sitemap.xml.gz

0 Bytes
Binary file not shown.

0 commit comments

Comments
 (0)