-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Recursive decisions #74
Comments
Not sure if this is the best place to note it, but "fix" actions should include "decommission the vulnerable instance" in addition to "apply a patch". The rationale being that a "fix" action reduces the number of deployed vulnerable instances, whereas a mitigation action reduces the risk (i.e., via either reducing probability of exploitation or reducing impact if exploited) of deployed vulnerable instances. |
This comment is also relevant to #76 |
02:17 PM So 74 before 79 - check 74 has 2 parts. |
This part may be partly covered by #29 and what we've added to address it in #96. That's in |
040_stakeholders-scope.md the End of Life/decommissioning the system is covered... |
Emphasize "mitigations" may be temporary. (By definition, mitigations are temporary, however the remediation may never be created by the supplier.) The software may be at (or past) normal "End of Life" and the supplier refuses to issue a remediation. Additional work may be necessary by the supplier to create a fix which will eliminate or remove the vulnerability. (If) Once the supplier completes the remediation, the deployer must make a decision regarding the need to implement a remediation for a vulnerability for which a deployer has already implemented a mitigation. One factors to consider is cost (downtime, effort for testing & installation of mitigation). From a deployer’s decision point, is the software at end of use for their company? Do they intend to replace the (mitigated) vulnerable system with an altogether different system? Does the deployer have the option to not apply the remediation? (yes) How/should it be recorded? @j--- Am I on the right track? |
Yes, I think this is the right stuff to discuss. One thing we may be able to tackle is to open up the line of thinking that a successfully applied mitigation may change some of the SSVC answers. An obvious one is system exposure. There is a little bit of discussion about changing information in |
I agree mitigation in practice is often temporary, in expectation of forthcoming remediation, and we can/should absolutely say that. But I'd like to keep mitigation strictly separate from a sense of temporary or permanent. IOW, it should be possible to mitigate (not remediate) and take no further action, ever, even if there is a remediation. Perhaps it's implied, if a vulnerability is remediated, then there's no reason to perform SSVC assessments on it anymore, right? I like the idea that
|
I think it is implied, but we should make it explicit as part of resolving this issue.
Agreed. I also like making those 4 steps explicit. |
I can't issue a new pull request until the other one is completed (060_ minor changes). So I'm putting my text here for you folks to have a look at. Let me know what you think... Worked on 040_stakeholders-scope... I included both paragraphs for context, but I only changed the first one. Deploying Patches Whether or not to deploy available remediation is a binary decision. However, additional defensive mitigations may be necessary sooner than patches are available and may be advisable after patches are applied. Applying mitigations will change the decision point for System Exposure and possibly Well-being and Mission Impact, shifting the priority to defer. Later, if the supplier provides a patch, the deployer may continue to defer, as the risk has been mitigated. We recognize that vulnerability management actions are different when a patch is available and when it is not available. When remediation is available, usually the action is to apply it. When remediation is not yet available, the action space is more diverse, but it should involve mitigating the vulnerability (e.g., shutting down services or applying additional security controls) or accepting the risk of not mitigating the vulnerability. Table 3 displays the action priorities for the deployer, which are similar to the supplier case. |
I'd like to unpack this a bit more. It could be the following paragraph: Applying mitigations should change the value of decision points. |
Please review when you have a moment. Thanks.
update per our discussion. Please let me know if more changes are needed.
* Update 060_decision-trees.md Minor punctuation and typos. * Update 040_stakeholders-scope.md Applying a mitigation may result in no need to patch (remediate) * Update 040_stakeholders-scope.md * Update 040_stakeholders-scope.md * Update 060_decision-trees.md * Update 040_stakeholders-scope.md * Update 040_stakeholders-scope.md * Update 040_stakeholders-scope.md * Update 040_stakeholders-scope.md * Update 040_stakeholders-scope.md * Update 040_stakeholders-scope.md * Issue #74 Recursive decisions - 040 update per our discussion. Please let me know if more changes are needed. * Update 040_stakeholders-scope.md add a dropped sentence back in a slightly different place, fix a comma * Update 040_stakeholders-scope.md later if it -> if it later * Update 040_stakeholders-scope.md An effective firewall or IDS rule coupled with an adequate change control process for rules... Co-authored-by: Allen D. Householder <ahouseholder@users.noreply.github.com>
Describe how SSVC decisions can be used recursively as the situation changes. Changes outside the control of the stakeholder are included in #29. So this issue is to discuss changes to the situation based on actions by the stakeholder. There are situations where, for example, you apply new firewall rules and that will change Exposure. Such a mitigation may not be a complete fix, but if it changes the priority with which you need to act from out-of-cycle to defer, then it was still in some sense an end to the current need to attend to the vul.
Describe difference between 'fix" (remediate) and "mitigate" actions related to recursing decisions.
(formerly part of action #46 )
The text was updated successfully, but these errors were encountered: