Remediateing security holes
I was wondering how you guys remediate security issues in your organizations. I know of some tools like BigFix that allow for remote remediation, but I was just wondering what else might be in vogue these days.
Graduated Carnegie Mellon University MSIT: Information Security & Assurance Currently Reading Books on TensorFlow
Comments
-
ptilsen Member Posts: 2,835 ■■■■■■■■■■
-
ChooseLife Member Posts: 941 ■■■■■■■□□□We are using a mauve database. That or I did not understand your question correctly.“You don’t become great by trying to be great. You become great by wanting to do something, and then doing it so hard that you become great in the process.” (c) xkcd #896
GetCertified4Less - discounted vouchers for certs -
ChooseLife Member Posts: 941 ■■■■■■■□□□I actually currently work on security issues remediation, and can provide some comments if you have a more defined question.“You don’t become great by trying to be great. You become great by wanting to do something, and then doing it so hard that you become great in the process.” (c) xkcd #896
GetCertified4Less - discounted vouchers for certs -
afcyung Member Posts: 212Well since the question is vague I will just say in general if we find a vulnerability with a scanner if its a violation of established policy(in my case that means AFIs DISA STIGs, NSA guidance) its fixed based on the severity of the vulnerability. If we get something that's not clearly defined in policy we take it to the local CCB for discussion/remediation. Is this a real issue or a false positive. Is this vulnerability an approved weakness and thus not a concern? What steps can we take to mitigate the issue in the interim until the system is fixed, it might be a system missing a critical patch but that patch might break software so we can't install it yet that type of thing.
-
the_Grinch Member Posts: 4,165 ■■■■■■■■■■When I did PCI compliance an outside firm would perform a scan and report what they found. After that we would perform our own scan with SAINT to confirm their findings. If they were the same, we would look at the documentation provided by them and by our internal engineers to fix said whole. Generally, if you research the results you'll find the patch or registry tweaks that you need to make.WIP:
PHP
Kotlin
Intro to Discrete Math
Programming Languages
Work stuff -
slickprog Registered Users Posts: 3 ■□□□□□□□□□In terms of automated security tools, I know my organization uses McAfee Foundstone along with several other tools. We have a mature process where a central server pushes out approved (tested) patches/fixes.
There are of course non-technical IT related security issues/weaknesses which tools cannot remediate, which is where a solid process comes in handy to ensure operational/management/physical IT related issues are fixed.