Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

구독

How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform: The Importance of Contextual Prioritization

How to secure all your IT OT and IoT assets with exposure management

Discover how contextual prioritization of exposure is revolutionizing OT/IoT security, enabling organizations to shift from reactive to proactive breach prevention.

Connectivity of physical assets— such as heating, ventilation, and air conditioning (HVAC) systems in data centers and office buildings, and cameras on the manufacturing floor – has created an expanding cyberattack surface. As IT, operational technology (OT) and Internet of Things (IoT) assets become increasingly interconnected, pathways are created for threat actors to traverse IT and OT environments, with devastating results. Consequently, today's CISOs find themselves increasingly accountable for securing not only IT environments, but OT and IoT environments as well.

To combat these threats, enterprise security organizations must understand the risks to assets in a business context. This was the focus of part one in this three part blog series, “How To Secure All of Your Assets - IT, OT and IoT - With an Exposure Management Platform.” In this second installment, we’ll expand on key challenges that impede effective breach prevention. We’ll also explain how enterprises can operationalize exposure management (EM) by using an attacker’s perspective to prioritize, and that way maximize their security team’s limited staff and resources.

Taking vulnerability management to the next level with exposure management

Vulnerability management (VM) is a critical component of any successful security program. It looks to proactively identify weaknesses that could allow attackers to breach the perimeter, move laterally, and achieve a desired objective. VM programs frequently leverage the Common Vulnerability Scoring System (CVSS) to assess the severity of publicly disclosed Common Vulnerabilities and Exposures (CVEs) and prioritize what to remediate first. This is a great starting point. However, a standard CVSS score does not take into account other important variables, such as asset criticality and relationships. These could be used to refine risk assessment and more accurately identify true business exposure. As a result, security teams can end up overwhelmed, chasing an endless mountain of critical and high-severity findings. 

To address this challenge, EM introduces additional layers of visibility which are vital for effective prioritization. For example, EM looks to identify the entire attack surface, which includes not only traditional IT assets, such as laptops and servers, but also OT and IoT assets, including those that are unseen and unmanaged, as well as human and machine identities – all of which are potential targets of attackers. EM also looks at all three preventable forms of risk – vulnerabilities, misconfigurations and excessive privileges – that allow attackers to not only gain initial access but to move laterally. With this foundation of broad and deep visibility into assets and risk across the attack surface, EM can apply additional layers of context, beyond CVSS, to more effectively assess and prioritize true risk exposure.

Operationalizing EM to optimize prioritization and remediation

Our Tenable One Exposure Management Platform provides a top-down, business-aligned view of cyber exposure. Assets and identities (regardless of domain or silo) are aligned to what matters most to the organization — the manufacturing plant, business processes or mission-critical applications they support.

In this blog, we explain the importance of having a contextual view of business exposure, and discuss how you can leverage this top-down context to more effectively and precisely prioritize remediation – and that way significantly reduce the risk to your organization.

Business-aligned cyber exposure

With Tenable One for OT/IoT, rather than manually look for risk across the entire attack surface of internally and externally facing assets, organizations can instantly see business-aligned exposure cards, reflecting the overall Cyber Exposure Score (CES) for each critical area of the business. In the hypothetical example below, we can see a manufacturing plant in Chicago that represents a major revenue source for the organization. The plant has an overall CES of 220/1000 (B). This tells us that the relative exposure of the overall plant is low. We can quickly assess what category of assets represents the greatest risk to the plant.

CES for Plant 3

Additionally, Plant 3’s CESs can be used as a benchmark when assessing risk across multiple sites, which is useful in prioritizing future investments in headcount needed for remediation. 

Business-aligned asset exposure

But as a primary revenue driver, we also need to understand the specific assets that may represent continued exposure for the manufacturing plant. From the Plant 3 - Chicago exposure card we can access the associated asset inventory view shown below. The asset inventory reflects all assets that are aligned to the plant, along with an Asset Exposure Score (AES) for each asset. The AES is designed to provide a simple to easy-to-understand, prioritized view of assets that represent the greatest risk of exposure.

Worth noting, the CES for the above exposure card is automatically calculated by aggregating and weighing the AES of all assets aligned to this specific plant through the use of machine learning algorithms.

Cyber Asset Management View - Multi-domain


Deep asset context

If we are to leverage AES as a key means of improving prioritization, it is important to understand and have direct access to how AES is calculated. The first critical piece of context used to derive AES is the Asset Criticality Rating (ACR). ACR measures the relative importance and potential impact of an asset. ACR is based on several key metrics such as business purpose, asset type, location, connectivity, capabilities and third-party data. For example, a server should have a higher asset criticality than an IoT asset such as a printer. Further, an asset associated with a mission-critical plant should receive a higher criticality rating than one that is not aligned to revenue generation. ACR can be manually tuned to meet an organization’s specific requirements using asset tagging, as reflected in the example below. ACR is expressed as an integer from 1 to 10, with higher values corresponding to the asset being more critical to the business. 

Asset Exposure Score - Plant 3

The second piece of context used to derive AES is the Vulnerability Priority Rating (VPR). VPR represents the severity and exploitability of a given vulnerability. VPR takes into consideration a range of static (e.g. CVSS) and dynamic variables to calculate the likelihood that a specific risk, such as a CVE or misconfiguration, will be exploited. Key variables used to calculate VPR for a given risk include the availability of exploit code in exploit kits and frameworks, references to exploitation on the dark web and hacker forums, reports of exploitation on social media, public proof-of-concept (PoC) research, and detection of malware hashes in the wild. Such threat intelligence is key in prioritizing weaknesses that pose the most risk to an organization. VPR is expressed as a number from 0.1 to 10, with higher values corresponding to a higher likelihood of compromise and higher impact on a specific asset.

Vulnerability Priority Rating

Because it is not unusual for a single asset to have multiple weaknesses, Tenable One aggregates the VPR for all weaknesses associated with a given asset, along with the ACR to calculate an overarching AES. This ensures that total risk is reflected in the overall AES. As a result, AES makes it possible to quickly identify which assets pose the greatest risk of exposure to the business, without the need to manually research all of the potential variables that exist in the wild. On its own, the business context and prioritization provide a significant improvement over less dynamic and holistic approaches.

Enhancing prioritization with attack path analysis 

Now that we have a baseline understanding of how AES is calculated, let’s see how we can operationalize AES, and further enhance prioritization by looking at asset exposure from an attacker’s perspective. 

In OT-heavy environments, such as our hypothetical manufacturing plant, it is not uncommon to see a cross-section of IT, OT, and even IoT assets. We will also have human and machine identities that have access to the network. As we’ve seen in many breaches, OT assets don’t usually enable initial access for an attacker. It is more often vulnerable IT assets, sometimes known, and other times unseen or unmanaged that provide an open door. Similarly, human and machine identities can be compromised due to poor hygiene or lack of policy, including weak passwords, lack of multi-factor authentication, and even due to the compromise of vulnerable assets used by third party vendors to access the network.

While AES provides a solid foundation for deciding what assets to prioritize and why, the optimal way to minimize exposure to the business is to have visibility into the complete attack path, so that you can determine which risk should be remediated first.

Attack path visualization and prioritization capabilities in Tenable One for OT/IoT provide a proactive response to remove paths that attackers may take. It performs this function by mapping critical risks to the MITRE ATT&CK framework, thus allowing security teams to visualize all viable attack paths continuously. This reveals critical insights on externally facing and newly added assets, communication patterns, relationships, and previously unknown attack vectors. This visibility allows security teams to implement controls to mitigate risk of compromise.

Asset Vulnerability Exploit

Vulnerability Priority Exploit

Machine Identity Compromise

Machine Identity Compromise

For example, security teams can see human identities with high privileges that, if compromised due to poor password quality, can allow attackers to breach a highly-privileged identity. Similarly, they can identify where air-gapped networks may have been connected to the internet, with open, unrestricted ports, giving attackers a means to ultimately traverse the network and compromise critical OT assets. Equally important, Tenable One allows practitioners to automatically identify choke points, which allow prioritized remediation of the most critical risks that will have the biggest impact on reducing overall exposure. 

Choke Point Prioritization

Choke Points

By arming security personnel with a prioritized view of asset exposure with business context, associated attack paths and choke points, and detailed remediation steps and workflow integrations, Tenable One reduces noise while measurably reducing business exposure.

Schedule a free consultation and demo

OT/IoT용 Tenable One이 조직에 어떤 도움이 되는지 알아보시겠습니까?Schedule a free consultation to receive a quick technical demo and to discuss how we can help improve your security program and results.

For more information about Tenable One for OT/IoT, visit tenable.com/products/tenable-one or sign up for our upcoming webinar “The Invisible Bridge: Recognizing The Risk Posed by Interconnected IT, OT and IoT Environments” for an expert deep dive on topics explored in this post.

자세히 알아보기

관련 기사

도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Web App Scanning 사용해보기

Tenable One - 위험 노출 관리 플랫폼의 일부분으로 최근의 애플리케이션을 위해 설계한 최신 웹 애플리케이션 제공 전체 기능에 액세스하십시오. 많은 수작업이나 중요한 웹 애플리케이션 중단 없이, 높은 정확도로 전체 온라인 포트폴리오의 취약성을 안전하게 스캔합니다. 지금 등록하십시오.

Tenable Tenable Web App Scanning 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Web App Scanning 구입

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

5 FQDN

$3,578

지금 구매

Tenable Lumin 사용해 보기

Tenable Lumin으로 위험 노출 관리를 시각화하여 파악하고 시간에 걸쳐 위험 감소를 추적하고 유사한 조직과 대비하여 벤치마킹하십시오.

Tenable Lumin 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Lumin 구매

영업 담당자에게 문의하여 어떻게 Tenable Lumin이 전체 조직에 대한 통찰을 얻고 사이버 위험을 관리하는 도움이 되는지 알아보십시오.

무료로 Tenable Nessus Professional 사용해보기

7일 동안 무료

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다.

신규 - Tenable Nessus Expert
지금 사용 가능

Nessus Expert는 외부 공격 표면 스캔닝과 같은 더 많은 기능 및 도메인을 추가하고 클라우드 인프라를 스캔하는 기능을 추가합니다. 여기를 클릭하여 Nessus Expert를 사용해보십시오.

아래 양식을 작성하여 Nessus Pro 평가판을 사용해보십시오.

Tenable Nessus Professional 구입

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다. Tenable Nessus Professional은 취약성 스캔 절차를 자동화하고 컴플라이언스 주기의 시간을 절감하고 IT 팀과 참여할 수 있도록 합니다.

여러 해 라이선스를 구매하여 절감하십시오. 연중무휴 전화, 커뮤니티 및 채팅 지원에 액세스하려면 Advanced 지원을 추가하십시오.

라이선스 선택

여러 해 라이선스를 구매하여 절감하십시오.

지원 및 교육 추가

무료로 Tenable Nessus Expert 사용해보기

7일간 무료

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

이미 Tenable Nessus Professional을 보유하고 계십니까?
7일간 Nessus Expert로 무료 업그레이드하십시오.

Tenable Nessus Expert 구입

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

라이선스 선택

여러 해 라이선스를 구매하여 비용을 더 절감하십시오.

지원 및 교육 추가