- Post History
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Subscribe
- Printer Friendly Page
- Report Inappropriate Content
12-30-2022 07:47 PM - edited 12-30-2022 10:40 PM
Background:
Many of the CISO’s security executives struggle to build awareness of the various accomplishments and struggles related to the enterprise's security posture. Leaders for vulnerability and incident response management need a shared view to guide the leadership and stakeholder teams.
Recommendations:
Setup, configure, and improve the organization’s security posture via the CISO dashboard.
- Install the Performance Analytics Store Apps for VR and SIR. Install Plugins, ensure Jobs are active, and Scan Coverage CMDB Configuration Item (CI) data is correct.
- Setup CISO dashboards for VR with ingestion enabled.
- Setup Scan Coverage with Required CIs and Vulnerability Solution Management.
- Setup SIR Dashboard and ensure incident count and dashboard are the same.
- Setup VR CISO Dashboard metrics for trending metrics and prioritization of vulnerabilities
- Use SIR CISO Dashboard to view prioritized incidents, most vulnerable CIs, and security incident trends.
- Establish governance through a meeting that leverages the CISO metrics and organizational trajectory with stakeholders.
Roles needed
- sn_vul.vulnerability_ciso required to view the dashboard.
- sn_vul.ciso_write needed to edit the dashboard.
System requirements
- Security Incident Response (SIR) Pro includes CISO Dashboard for Security Incident Response (PA for SIR)
- Vulnerability Response (VR) Pro includes CISO Dashboard for VR (PA for VR)
1. Install the Performance Analytics Store Apps for VR and SIR. Install Plugins, ensure Jobs are active, and Scan Coverage CMDB Configuration Item (CI) data is correct.
- Install the Store app and plugins needed to get the CISO Dashboard. The names of the apps will be:
- Performance Analytics for Vulnerability Response
- Performance Analytics for Security: when searching for installing the plugin, you may see a second option for Performance Analytics Premium for Security Operations, do not install it.
- Step-by-step instructions for installing the store app can be found here.
- For VR: the documentation recommends changing the Performance Analytics Properties (step 15.C.), however, do not do this and skip step 15 altogether. Although docs recommend changes here, this will impact ALL indicators.
- Ensure the [PA VR] Cisco Dashboard Job is active.
- Performance Analytics > Data Collector > Jobs > [PA VR] Cisco Dashboard, change active to true.
2. Setup your CISO dashboards for VR with ingestion enabled
- Vulnerability Scanner ingestion is enabled using the store apps, which can be found at ServiceNow App Store.
- CMDB data and CMDB hygiene practices are in place; this means owners of CIs and Services can be identified; if not, there is a process to find them.
- Confirm that Scan Coverage has all the CMDB CI classes you expect to cover in the CISO Dashboard and correct any errors through the Scan Coverage Report to add additional CI Classes.
3. Setup Scan Coverage and Vulnerability Solution Management
- Ensure the Scan Coverage Calculation job is running and reflecting the expected number of Total CIs, Scanned CIs, and CMDB CI Classes.
- Vulnerability Response > Administration > Scan Coverage Configuration
- Note that this Job pulls from the CMDB and is then used to populate the CISO Dashboard.
- The setting for Indicator Sources must be changed to reflect the size of the VR implementation; by default, the maximum number of records is set to 1,000,000 for the override records collection. This should be increased according to the size of the overall deployment i.e incrementally increase by 1,000,000 as your VR environment grows.
- Go to indicator sources and change scope via the banner notification option.
- Performance Analytics -> Sources -> Indicator Sources, in the Active Vis (Services and Internet-facing) changes must be made in the Record Collection tab.
- Ensure Solutions management is installed and configured (RedHat, Microsoft, etc.)
- Install third-party integrations for Microsoft Response Center Solutions or Red Hat Solution.
- Vulnerability Response > Administration > Setup Assistant > Integration Configuration > Solution Integrations.
4. Setup your SIR Dashboard and ensure your incident count and dashboard are the same.
- Monitoring and Alerting (SIEM/EDR) ingestion is enabled using the store apps, which can be found at ServiceNow App Store.
- Data integrity will need to be checked. Validate that the number of incidents created matches what’s being created in the CISO Dashboard by comparing the number of created tickets vs what is in the CISO Dashboard.
5. Use VR CISO Dashboard effective metrics for trending metrics, prioritization of vulnerabilities, and Scan Coverage.
- VR metrics that need to be reviewed daily by the Vulnerability leadership team are: Average Vulnerability Per Asset, Mean Time to Remediate (MTTR), and Average Age of Vulnerabilities.
- Conversations with the CISO need to focus on monthly Remediation Efficiency of New and Closed Items.
- Scan Coverage needs to trend upwards, while the gap between Scanned Assets and Scannable Assets should narrow upward; convergence is the goal.
- Monthly Scan Coverage needs to trend upwards; if not, the team should investigate how to address this.
- Using the Recommended Actions tab, you can take strategic actions based on metrics that are prioritized to improve your security posture:
- Vulnerabilities' most prevalent on Assets
- Top 10 Oldest Vulnerable Items
- Top 10 Highest Impact Solutions
- Top 10 Vulnerabilities with Exploits Available
6. Use SIR CISO Dashboard to view prioritized security incidents, most vulnerable CIs, and incident trending metrics.
- The SIR metrics that need to be reviewed weekly by the Security Operations leadership team are Average Time to Identify, Average Time to Contain, and Average Time to Eradicate. You’ll want these going in a downward trend, but the key is to share this data with leadership to help prioritize resourcing needs.
- Observe New Security Incidents This week, and Security Incidents Closed This week are also present. These metrics focus on managing the Security Operations team directly vs providing guidance to leadership.
- Vulnerability Trends in the Vulnerability Profile tab which should slope downward, need to be shared with the leadership team to understand the vulnerabilities to Business Critical (CIs) to Business impact.
- For global teams, the Vulnerability Map helps with a recent breach or M&A or some other type of restructuring as a visual representation.
7. Establish governance through a meeting that leverages the CISO metrics and organizational trajectory with stakeholders
- Establish a VR-focused discussion with remediation teams and stakeholders twice a month.
- Trending - The conversations here need to focus on the direction of the trends and creating actionable steps.
- Example widget - New and Closed Vulnerable Items
- Are more vulnerabilities being found than being remediated? Are certain vendors releasing more vulnerabilities?
- What actions are being taken to address potential gaps?
- Example widget – Vulnerabilities' most prevalent on Assets
- Which assets are most impacted? Are they owned by one remediation team, such as the mail server team?
- Risk reduction discussions – Are there higher priority areas, such as regulatory (e.g., PCI), externally facing, old gear, or mission-critical gear?
- Establish a SIR-focused discussion with remediation teams and stakeholders twice a month.
- Trending - The conversations here need to focus on the direction of the trends and creating actionable steps.
- Example widgets – Average Time to Identify|Contain|Eradicate
- Throughout the three widgets, are we seeing the correct trending pattern?
- Are the right tools, people, and training in place? Are there other bottlenecks?
- Is the incident volume in line with the alert volume expected?
- Fine-tune alert ingestion process and tools regular basis.
- False positives need to be closely monitored and tuned as well.
- Other metrics are also available through the Performance analytics for VR and SIR. It can add to the discussion and explore different dashboards, such as the Security Operations Efficiency dashboard, to further enhance the conversations.
There will always be security threats in every organization. Still, effective strategies to combat them are not only tools but consistent practices such as established communication cadence leveraging a shared view.
Sample Agendas:
VR CISO Dashboard agenda:
- Discuss trends
- Discuss actionable areas to reduce risk
- Discuss areas of risk that need more focus
SIR CISO Dashboard agenda:
- Discuss trends
- Discuss actionable areas to reduce risk
- Discuss areas of risk that need more focus
- 1,464 Views