Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable 블로그

구독

Tenable 2022 위협 환경 보고서: 알려진 취약성을 처리하여 위험 노출을 감소

Tenable 2022 Threat Landscape Report spotlights vulnerabilities to remediate now

The 2022 Threat Landscape Report — Tenable’s annual look at the vulnerabilities and cyberthreats facing security teams — drives home the sheer enormity of the challenges involved in reducing risk. The report provides analysis of the vulnerability landscape, a deep dive into the events that shaped the threat landscape and a detailed breakdown of vulnerabilities sorted by vendor.

Some might find the 65-page report daunting. In reality, as comprehensive as it is, any report of this kind can only hope to represent a segment of the tens of thousands of vulnerabilities security teams are faced with every year. At Tenable, we believe the only way for security professionals to effectively reduce risk is by taking a contextual look at the factors influencing today’s complex digital organizations. The Threat Landscape Report is a tool that can aid in that effort.

In the course of its daily work, Tenable’s Security Response Team inspects data from hundreds of sources in order to identify events relevant to our customers and the broader cybersecurity industry. From this vantage point, we’re able to view the vulnerability and threat landscapes holistically to help security professionals identify the trends that matter most. This contextual view is essential for organizations looking to evolve from a reactive cybersecurity posture to one focusing on preventive and proactive measures.

Cybersecurity organizations are well beyond the point where vulnerability management can be performed in a vacuum. The modern attack surface contains a mix of on-premises and cloud-based infrastructure, complex identity and access management systems and large numbers of web applications and microservices. The broad array of siloed cybersecurity tools and systems organizations have in place is not helping to reduce risk.

Perhaps even more concerning is that known flaws continue to rear their ugly heads year after year.

Over a five-year period from 2018 through 2022, the number of reported CVEs increased at an average annual growth rate of 26.3%. There were 25,112 vulnerabilities reported in 2022 (as of January 9, 2023), which represents a 14.4% increase over the 21,957 reported in 2021 and a 287% increase over the 6,447 reported in 2016. Perhaps even more concerning is that known flaws continue to rear their ugly heads year after year. In fact, known vulnerabilities dating as far back as 2017 were so prominent in our findings that they occupy the top spot in the 2022 list of the top 5 vulnerabilities.

Analyzing the vulnerability landscape alone only tells part of the story. Security professionals also need to understand the threat landscape: how attackers are using those vulnerabilities, along with other tools and tactics, to target enterprises, governments and nonprofits.

A comprehensive view of the landscape is fundamental to building an effective exposure management program — which involves a combination of people, process and technology. Exposure management enables organizations to transcend the limitations of siloed security programs. Building an exposure management program involves bringing together data from tools associated with vulnerability management, web application security, cloud security, identity security, attack path analysis and attack surface management and analyzing it within the context of an organization’s unique mix of users and IT, operational technology (OT) and internet of things (IoT) assets. 목표는 Having the contextual data needed to execute an ongoing, preventive security program built on risk-based workflows.

To aid in that mission, the 2022 Threat Landscape Report examines:

  • Significant vulnerabilities disclosed and exploited throughout the year, including how common cloud misconfigurations can affect even tech juggernauts.
  • The continuous transformations of the ransomware ecosystem and the rise of extortion-only threat groups.
  • Ongoing risks, vulnerabilities and attacks within the software supply chain.
  • Tactics used by advanced persistent threat groups to target organizations with cyberespionage as well as disruptive and financially motivated attacks.
  • Breach factors and the challenges in analyzing breach data, given the limited information available and lack of detailed reporting requirements.
  • Details of the key vulnerabilities affecting enterprise software.

Five ways to use this report

There are five key ways security professionals can use the findings contained in this report:

  1. Reduce your organization’s exposure by identifying and remediating the vulnerabilities and misconfigurations referenced.
  2. Keep attackers at bay by learning how threat actors are breaching organizations and the tactics they’re employing to hold organizations and their sensitive data for ransom.
  3. Protect data by examining some of the common ways data breaches occur and what your organization can do to prevent them.
  4. Prioritize the vulnerabilities that are most commonly exploited and maximize the effectiveness of your patching and mitigation strategy.
  5. Broaden your security controls to address cloud and identity misconfigurations that attackers continue to target.

The report also provides four recommendations for actions security professionals can take today to improve their preventive cybersecurity efforts and beef up their exposure management practices.

A peek inside the 2022 Threat Landscape Report

The report is organized into three sections which, taken together, are designed to provide a circumspect view of the year in cybersecurity while making it easy for security professionals to home in on the areas that matter most to their organization.

Section one explores notable events in the vulnerability landscape, including:

  • The ongoing prominence of Microsoft Exchange Server vulnerabilities in attacks
  • Log4Shell, notable vulnerabilities and supply chain concerns
  • Cloud security issues and misconfigurations

Section two explores events that shaped the threat landscape, including:

  • Nation state activity
  • The sustained impact of ransomware and the evolution of the ecosystem and tactics
  • Data breach events and key observations drawn from a compilation of publicly-available data

Section three provides a list of all the vulnerabilities discussed in the report sorted by vendor, so you can quickly home in on the ones that matter most to your organization. We provide a detailed look at more than 170 vulnerabilities affecting more than 30 vendors and open source tools, including Apache, Apple, Atlassian, F5 Networks and Microsoft.

자세히 알아보기

관련 기사

도움이 되는 사이버 보안 뉴스

이메일을 입력하여 Tenable 전문가에게서 적시에 알림을 받고 보안 참고 자료를 놓치지 마십시오.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오.

Tenable Vulnerability Management 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Vulnerability Management

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

100 자산

구독 옵션 선택:

지금 구매

Tenable Web App Scanning 사용해보기

Tenable One - 위험 노출 관리 플랫폼의 일부분으로 최근의 애플리케이션을 위해 설계한 최신 웹 애플리케이션 제공 전체 기능에 액세스하십시오. 많은 수작업이나 중요한 웹 애플리케이션 중단 없이, 높은 정확도로 전체 온라인 포트폴리오의 취약성을 안전하게 스캔합니다. 지금 등록하십시오.

Tenable Tenable Web App Scanning 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Web App Scanning 구입

비교할 수 없는 정확도로 모든 자산을 확인하고 추적할 수 있는 최신 클라우드 기반 취약성 관리 플랫폼 전체에 액세스하십시오. 지금 연간 구독을 구매하십시오.

5 FQDN

$3,578

지금 구매

Tenable Lumin 사용해 보기

Tenable Lumin으로 위험 노출 관리를 시각화하여 파악하고 시간에 걸쳐 위험 감소를 추적하고 유사한 조직과 대비하여 벤치마킹하십시오.

Tenable Lumin 평가판은 Tenable Lumin 및 Tenable Web App Scanning을 포함합니다.

Tenable Lumin 구매

영업 담당자에게 문의하여 어떻게 Tenable Lumin이 전체 조직에 대한 통찰을 얻고 사이버 위험을 관리하는 도움이 되는지 알아보십시오.

무료로 Tenable Nessus Professional 사용해보기

7일 동안 무료

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다.

신규 - Tenable Nessus Expert
지금 사용 가능

Nessus Expert는 외부 공격 표면 스캔닝과 같은 더 많은 기능 및 도메인을 추가하고 클라우드 인프라를 스캔하는 기능을 추가합니다. 여기를 클릭하여 Nessus Expert를 사용해보십시오.

아래 양식을 작성하여 Nessus Pro 평가판을 사용해보십시오.

Tenable Nessus Professional 구입

Tenable Nessus는 현재 구입 가능한 가장 종합적인 취약성 스캐너입니다. Tenable Nessus Professional은 취약성 스캔 절차를 자동화하고 컴플라이언스 주기의 시간을 절감하고 IT 팀과 참여할 수 있도록 합니다.

여러 해 라이선스를 구매하여 절감하십시오. 연중무휴 전화, 커뮤니티 및 채팅 지원에 액세스하려면 Advanced 지원을 추가하십시오.

라이선스 선택

여러 해 라이선스를 구매하여 절감하십시오.

지원 및 교육 추가

무료로 Tenable Nessus Expert 사용해보기

7일간 무료

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

이미 Tenable Nessus Professional을 보유하고 계십니까?
7일간 Nessus Expert로 무료 업그레이드하십시오.

Tenable Nessus Expert 구입

최신 공격 표면을 방어하기 위해 구축된 Nessus Expert를 사용하면 IT부터 클라우드까지, 더 많은 것을 모니터링하고 조직을 취약성으로부터 보호할 수 있습니다.

라이선스 선택

여러 해 라이선스를 구매하여 비용을 더 절감하십시오.

지원 및 교육 추가