Skip to content

Latest commit

 

History

History
82 lines (61 loc) · 8.53 KB

Vulnerability_management_definitions.md

File metadata and controls

82 lines (61 loc) · 8.53 KB

Vulnerability Management Definitions and Sample SLAs

About

This document provides a consistent approach for determining security priorities for various types of issues. It also details common remediation Service Level Agreements (SLAs) in accordance with standard compliance requirements and best practices. This information can be used to develop guidelines or policies for your company.

Security SLAs

This section provides sample remediation timelines for vulnerabilities based on their severity. The SLAs under the 'default time to remediate' are considered good starting points, while the columns to the right correspond to specific compliance standards. It is strongly recommended to adhere to stricter SLAs to ensure compliance, fulfill contractual obligations, and maintain a strong security posture.

Vulnerability severity Default time to remediate PCI-DSS SLA FEDRAMP SLA
Critical 0-7 days ~30 days ~30 days
High ~30 days Not explicitly specified 30-90 days
Medium ~60 days Not explicitly specified 90-180 days
Low ~90 days Not explicitly specified ~180 days

Notes:

  • Before finalizing vulnerability remediation SLAs, it is strongly recommended to consult with your compliance team to ensure that these SLAs meet or exceed the current versions of any applicable standards (e.g., PCI-DSS).
  • Additionally, coordinate with your legal team to ensure these SLAs align with the SLAs agreed upon in customer contracts.

Security Severities and Calculating Severity Level

The science behind risk management and risk calculations can be quite extensive. If you're reading this, you may not have an expert with these skills at your company and need a 'good enough' solution to get started. The goal of this section is to provide a simplified approach for calculating risk that can be used to assign severity levels, which can then be linked to remediation timelines as outlined above.

Option 1 - Vulnerability bug bar

A vulnerability bug bar is a table that outlines common vulnerabilities and their default risk levels. This simplified approach to classifying vulnerability risk is often a good starting point for quantifying risk and allows for rapid severity calculations. While it may not be entirely scientifically accurate, it works well over 90% of the time and can help establish a program quickly with limited resources.

Example bug bar

Vulnerability severity Examples of vulnerabilities Impact
Critical Remote command execution, SQL injection, sensitive data leakage Vulnerabilities that are easily exploited and can grant full control over a system or access to the most sensitive data.
High Privilege escalation, lack of token expiration, Cross-site scripting Vulnerabilities that can cause significant downtime or expose data.
Medium Denial of service, open redirects, missing cookie security flags Vulnerabilities that are more difficult to exploit but present moderate concern.
Low Server-side request forgery, server path disclosure, Clickjacking Vulnerabilities that are very difficult to exploit or have a low impact if exploited.

Notes:

  • This doesn't automatically factor in externally exploitable vs internally exploitable issues, nor does it factor in if the issue is known to a third party (e.g. security researcher, customer, partner, etc...). For issues that are only internally exploitable, it is common to reduce the priority by one level.
  • You will need to align with your security incident response owner to determine if externally known issues require triggering a security incident.
  • Lastly, Microsoft has a pretty extensive security bug bar worth checking out covering both client and server side issues.

Pros: Enables rapid risk calculation by anyone without needing a risk calculator or entering numerous fields. The bug bar offers greater speed compared to a risk calculator when dealing with a dozen or more issues, though it sacrifices some scientific accuracy.
Cons: Factors like "is this accessible on the internet" are not automatically considered when using a bug bar. A common approach is to subtract the risk level if the issue is internal or not accessible by an external attacker.

Option 2 - CVSS risk calculation

A popular vulnerability scoring approach is to use the CVSS framework and its associated risk calculator. This approach allows you to consistently generate the same priority for each issue and incorporates accessibility and likelihood in a more scientific manner.

Vulnerability severity Examples of vulnerabilities Corresponding CVSS 4.x scores
Critical Remote command execution, SQL injection, sensitive data leakage 9.0-10.0
High Privilege escalation, lack of token expiration, Cross-site scripting 7.0-8.9
Medium Denial of service, open redirects, missing cookie security flags 4.0-6.9
Low Server-side request forgery, server path disclosure, Clickjacking 0.1-3.9

Notes:

  • The examples above represent vulnerability rankings using the CVSS system. Scores may increase or decrease depending on the impact of the issue being exploited and the version of CVSS used.
  • CVEDetails [3] provides a useful tool for exploring published vulnerabilities as measured by the CVSS scoring system.

Pros: Many security scanners provide CVSS scores with each finding, which makes prioritization easier. This allows you to reuse the scores in most cases.
Cons: Using the risk calculator for every issue can be time-consuming. When you have dozens or more findings, this process can take considerable time and is the biggest drawback of this approach.

Option 3 - CVSS + (Option 1 or Option 2)

Security scanners typically assign vulnerability severity automatically based on a CVSS score, simplifying risk calculation. This results in considerable time savings when determining the severity of each finding in bulk. Option 3 involves a hybrid approach, combining either Option 1 or Option 2 with the CVSS scores generated by automated vulnerability scanners. This middle-ground approach eliminates the need to manually classify the severities of scanner findings and supports ranking issues discovered by individuals, such as through a pentest, bug bounty, or other reports.



Pros: You benefit from accepting scanner finding priorities as they are. You can choose either Option 1 or Option 2 based on your risk tolerance and the resources available for classifying non-scanner findings.
Cons: Accepting scanner findings as they are, while also using a bug bar, may lead to scientific inconsistencies in your risk calculations.

Additional references

[1] CVSS 4.0 Risk calculator https://www.first.org/cvss/calculator/4.0

[2] Microsoft security bug bar https://learn.microsoft.com/en-us/security/engineering/security-bug-bar-sample

[3] CVEDetails - Search by CVSS score https://www.cvedetails.com/cvss-score-distribution.php

Document version 1.0 copied from Sectemplates.com