Skip to content

JesseWebbCyber/Vulnerability_Management_Program

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

Official Cyber Range Internship Project

This project documents my individual implementation of a vulnerability management program completed as part of the Log(N) Pacific Cyber Range internship.

Vulnerability Management Program Implementation

In this project, I simulate the implementation of a vulnerability management program in a small enterprise-style environment, focusing on realistic workflows, stakeholder interaction, and remediation tradeoffs.

Inception State: the organization has no existing policy or vulnerability management practices in place.

Completion State: a formal policy is enacted, stakeholder buy-in is secured, and a full cycle of organization-wide vulnerability remediation is successfully completed.


image of tenable and azure virtual machine network setup that was utilized for this project

Technology Utilized

  • Tenable (enterprise vulnerability management platform)
  • Azure Virtual Machines (Nessus scan engine + scan targets)
  • PowerShell & BASH (remediation scripts)

Table of Contents


Vulnerability Management Policy Draft Creation

This phase focuses on drafting a Vulnerability Management Policy as a starting point for stakeholder engagement. The initial draft outlines scope, responsibilities, and remediation timelines, and may be adjusted based on feedback from relevant departments to ensure practical implementation before final approval by upper management.
Draft Policy


Step 2) Mock Meeting: Policy Buy-In (Stakeholders)

In this phase, a meeting with the server team introduces the draft Vulnerability Management Policy and assesses their capability to meet remediation timelines. Feedback leads to adjustments; for example, extending the critical remediation window from 48 hours to one week, ensuring collaborative implementation.

image

Mock Meeting YouTube Video

Mock Meeting Text Script


Step 3) Policy Finalization and Senior Leadership Sign-Off

After gathering feedback from the server team, the policy is revised, addressing aggressive remediation timelines. With final approval from upper management, the policy now guides the program, ensuring compliance and reference for pushback resolution.
Finalized Policy

generated image of company decision makers finalizing the policy for vulnerability remediation

Step 4) Mock Meeting: Initial Scan Permission (Server Team)

The team collaborates with the server team to initiate scheduled credential scans. A compromise is reached to scan a single server first, monitoring resource impact, and using just-in-time Active Directory credentials for secure, controlled access.

image

Mock Meeting YouTube Video

Mock Meeting Text Script


Step 5) Initial Scan of Server Team Assets

In this phase, an insecure Windows Server is provisioned to simulate the server team's environment. After creating vulnerabilities, an authenticated scan is performed, and the results are exported for future remediation steps.

image

Scan 1 - Initial Scan


Step 6) Vulnerability Assessment and Prioritization

Vulnerabilities were assessed and prioritized based on potential impact, exploitability, and ease of remediation. The following priorities were set:

  1. Third Party Software Removal (Wireshark)
  2. Windows OS Secure Configuration (Protocols & Ciphers)
  3. Windows OS Secure Configuration (Guest Account Group Membership)
  4. Windows OS Updates
  5. Remaining High-Severity Vulnerabilities

Step 7) Distributing Remediations to Remediation Teams

The server team received remediation scripts and scan reports to address key vulnerabilities. This streamlined their efforts and prepared them for a follow-up review.

image of remediation email with links to 5 remediation powershell scripts

Remediation Email


Step 8) Mock Meeting: Post-Initial Discovery Scan (Server Team)

The server team reviewed vulnerability scan results, identifying outdated software, insecure accounts, and deprecated protocols. The remediation packages were prepared for submission to the Change Advisory Board (CAB).

Mock Meeting YouTube Video

Mock Meeting Text Script


Step 9) Mock CAB Meeting: Implementing Remediations

The Change Advisory Board (CAB) reviewed and approved the plan to remove insecure protocols and cipher suites. The plan included a rollback script and a tiered deployment approach.

Mock Meeting YouTube Video

Mock Meeting Text Script


Step 10) Remediation Effort

Remediation Round 1: Outdated Wireshark Removal

The server team used a PowerShell script to remove outdated Wireshark. A follow-up scan confirmed successful remediation.
PowerShell: Wireshark Removal

image of scan 3 results

Scan 2 - Third Party Software Removal

Remediation Round 2: Insecure Protocols & Ciphers

The server team used PowerShell scripts to remediate insecure protocols and cipher suites. A follow-up scan verified successful remediation, and the results were saved for reference.
PowerShell: Insecure Protocols Remediation PowerShell: Insecure Ciphers Remediation

image of scan 3 results

Scan 3 - Ciphersuites and Protocols

Remediation Round 3: Guest Account Group Membership

The server team removed the guest account from the administrator group. A new scan confirmed remediation, and the results were exported for comparison.
PowerShell: Guest Account Group Membership Remediation

image of scan 4 results

Scan 4 - Guest Account Group Removal

Remediation Round 4: Windows OS Updates

Windows updates were re-enabled and applied until the system was fully up to date. A final scan verified the changes

image of scan 5 results

Scan 5 - Post Windows Updates

Remediation Round 5: Certificate Validation Hardening

Certificate trust validation was hardened by enabling WinVerifyTrust certificate padding checks to prevent acceptance of improperly signed executables. A follow-up scan confirmed no remaining critical or high-severity vulnerabilities.

PowerShell: WinVerifyTrust CVE-2013-3900 Mitigation

image of scan 6 results

Scan 6 - Certificate Validation Hardening


First Cycle Remediation Effort Summary

This remediation cycle focused on fixing the highest-risk issues first and tracking progress across multiple scans. Overall, total vulnerabilities were reduced by about 76%, dropping from 29 to 7 findings. All critical vulnerabilities were eliminated by the second scan after removing vulnerable third-party software. High-severity vulnerabilities were steadily reduced and fully resolved by the final scan, while medium-severity issues were reduced by roughly 65%. Low-severity findings stayed the same, reflecting a deliberate focus on higher-impact fixes. In a real production environment, the importance of the systems and how they're used would help determine what gets addressed next.

Image of Vulnerability Remediation Data

Remediation Data


On-going Vulnerability Management (Maintenance Mode)

After completing the initial remediation cycle, the vulnerability management program transitions into Maintenance Mode. This phase ensures that vulnerabilities continue to be managed proactively, keeping systems secure over time. Regular scans, continuous monitoring, and timely remediation are crucial components of this phase. (See Finalized Policy for scanning and remediation cadence requirements.)

Key activities in Maintenance Mode include:

  • Scheduled Vulnerability Scans: Perform regular scans (e.g., weekly or monthly) to detect new vulnerabilities as systems evolve.
  • Patch Management: Continuously apply security patches and updates, ensuring no critical vulnerabilities remain unpatched.
  • Remediation Follow-ups: Address newly identified vulnerabilities promptly, prioritizing based on risk and impact.
  • Policy Review and Updates: Periodically review the Vulnerability Management Policy to ensure it aligns with the latest security best practices and organizational needs.
  • Audit and Compliance: Conduct internal audits to ensure compliance with the vulnerability management policy and external regulations.
  • Ongoing Communication with Stakeholders: Maintain open communication with teams responsible for remediation, ensuring efficient coordination.

By maintaining an active vulnerability management process, organizations can stay ahead of emerging threats and ensure long-term security resilience.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors