Skip to content

Main goal of this project is defining framework for Vulnerability management based on Data Science.

License

Notifications You must be signed in to change notification settings

Tengrom/DataForVulnMan

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

82 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Frameworks for Vulnerability management based on Data science

Intro:

Vulnerability management is not just patching, but gathering, analyzing, managing data and calculating risks based on it.

In increasingly complex environments and increasingly frequent cyber attacks, vulnerability management is becoming an increasingly important and difficult task. I have seen many companies that could be saved from attack by implementing proper vulnerability management. Vulnerability management involves analyzing data from many sources. Thanks to this data, we can optimize our activities and identify our gaps.

No single tool can address all these challenges alone. Many companies already use multiple vulnerability scanners and multiple vulnerability management software. This also requires knowledge and a developed standard of operation.

In his project, I will try to gather all this knowledge in one place and propose standards ready to use including data science. Also will prepare ready solutions to make it easier to understand the vulnerability management process and to be used by companies that cannot afford expensive software.

Vulnerability management relies on data, so appropriate actions need to be taken, such as data cleaning, grouping, and others. For this, I will use the same process as in Data science. Data quality and security are the most important when managing vulnerabilities and they occur frequently in it errors that accumulate later. therefore, data must be approached in a systematic and proven way

The main goal of this project

Define a framework for Vulnerability management based on Data Science. It includes:

  • Propose of standard for how data should be collected, prepared and understood in Vulnerability management based on Data sciencie
  • Propose new analysis possibilities with examples of framework in Jupyter Notebook free for use.
  • Collecting the most important information, examples, standards and references to various applications and information needed in vulnerability management in one place

I encourage Everyone to collaboration to build more standardised and usefulness frameworks for different use cases for Vulnerability management.

Process:

Process is based on Data Science process: Process

Data collection:

It can be scanning or collecting data from different sources:

  • Scanning without authorisation
  • Scanning with high privileges authorization
  • Scanning local system by installed agent
  • Passive scanning of capture traffic
  • Gathering application versions by SCCM or other tools.
  • Other sources like proxy servers capture information about version browsers and system versions.
  • Analysing protocols on a network like If the device is responding with only SMBv1 version it means that it’s quite old and vulnerable.

Data Discovery:

First fast analytics:

  • Checking summary numbers: Total numbers of vulnerabilities, hosts.

  • Number of duplicated entries in CVE or hosts.

  • Top CVE, per software name or detection source. Top hosts per os and name

Most issues found in that step:

  • Small numbers of detected vulnerabilities or small numbers of detected hosts - issue with data sources or connector

  • Multiple duplications – issue with connector

Data cleansing

Semi manual analysis:

  • Checking if numbers are correct with number of hosts with other sources like Active Directory, clients using proxy, Firewalls

  • Checking if detected vulnerabilities could be false positives

  • Tree map to visualise distribution CVE per application. It can provide information about disproportion of your data for example discover only vulnerability related with one application, lack vulnerability for local installed applications

Data structuring

  • Adding tags with corresponding to the owners of sites, applications, hosts

Data transformation and enrichment(in Progress):

Data validation

  • Prepare reports and visualisation

  • Presenting finding to correct BU and investigate

Vulnerability management Maturity level

Below are links to great resources related to maturity level vulnerability management. I can only add a description of the practical steps that are best taken to create an efficient vulnerability management process. I divided them into four stages: Asset inventory, Vulnerability Scanning, Risk Management, Service Management:

Links to Vulnerability management Maturity levels information

Links to various applications and tools

Links

Project status :

Phase 1

  • Vulnerability management knowlage base - In progress
  • Basic AmongItems notebook - In progress
  • Basic OverTime notebook - In progress
  • Vulnerability management Maturity level - In progress
  • Basic RiskCalculation notebook- not started
  • CEO Dashboard with targets - not started

About

Main goal of this project is defining framework for Vulnerability management based on Data Science.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published