Application Vulnerability Management

jason_lau
Tera Contributor

For security operations module, we currently ingest QualysGuard infrastructure vulnerability data into Vulnerability Management module and that works great.

For application security testing we use Veracode for static, dynamic, and manual pen testing as part of our internal testing for SDLC.

What would be the best place to import those vulnerabilities, or is that something in roadmap (application vulnerability management versus infrastructure vulnerability management)?

Key difference here is that while infrastructure vulnerability is associated with a cmdb_ci (server, network device, etc), an application vulnerability is associated with a software build for an application.

Ideally, I would like to generate scorecards for each business unit / department showing where they stand for infrastructure remediation and application remediation. I'm half way there with Qualys data in Vulnerability Management, just need to figure out the right way to process application vulnerability findings.

Thanks,

Jason

1 ACCEPTED SOLUTION

jing3
Mega Guru

Hi Jason, 

I would say Vulnerability Response is the right base module for what you have in mind. So same Vulnerability Response processes should still work, meaning

  1. ingesting vulnerabilities from third party system 
  2. or create vulnerabilities using ServiceNow directly
  3. Generate Vulnerable Items from ingested data
  4. Create Vulnerability Groups to group VIT together
  5. Remediate 
  6. Close VIT/VUGs 

You can use existing tables for Vulnerability Entries, and Solutions. There is an existing table cmdb_ci_appl that you could use for your Application ConfigurationItem (or you can extend this table to meet your needs). 

Customize the ingesting script to match look CI in this Application table,  and create VIT accordingly (you can modle it after your existing Qualys import). All the rest should be streight forward. 

If you decide to track Application Vulnerability via ServiceNow, you can use Vulnerablity Entry from existing table, and CI from the customized Applicaiton table, create new Vulnerable Items. 

 

 

 

Hope this make sense. 

 

View solution in original post

4 REPLIES 4

Syra Arif
ServiceNow Employee
ServiceNow Employee

Hi Jason,



This is something being tracked by ServiceNow, thanks for your feedback.



May I suggest potentially creating another app to pull in this data?



Syra


SOMEN2
Kilo Contributor
Any module planned in upcoming releases to cater to application security governance within servicenow

jing3
Mega Guru

Hi Jason, 

I would say Vulnerability Response is the right base module for what you have in mind. So same Vulnerability Response processes should still work, meaning

  1. ingesting vulnerabilities from third party system 
  2. or create vulnerabilities using ServiceNow directly
  3. Generate Vulnerable Items from ingested data
  4. Create Vulnerability Groups to group VIT together
  5. Remediate 
  6. Close VIT/VUGs 

You can use existing tables for Vulnerability Entries, and Solutions. There is an existing table cmdb_ci_appl that you could use for your Application ConfigurationItem (or you can extend this table to meet your needs). 

Customize the ingesting script to match look CI in this Application table,  and create VIT accordingly (you can modle it after your existing Qualys import). All the rest should be streight forward. 

If you decide to track Application Vulnerability via ServiceNow, you can use Vulnerablity Entry from existing table, and CI from the customized Applicaiton table, create new Vulnerable Items. 

 

 

 

Hope this make sense. 

 

jason_lau
Tera Contributor

Fyi, this has been addressed with the latest release of Application Vulnerability Response, OOB.