A New Dimension to Cybersecurity: Continuous Vulnerability and Exposure Management (CVEM)
Allow me to introduce a novel approach to cybersecurity - one that promises to fortify our defenses, creating a robust posture capable of fending off cyberattacks.
To understand this perspective, I want to emphasize a fundamental truth that applies to every form of attack, whether in the physical world or the digital realm: every attack involves the exploitation of a weakness. Whether executed by a thief, a burglar, a goonda, a rowdy, a terrorist, or a state-sponsored actor, the common thread is the exploitation of a weakness. This holds true both in the physical world and the cyber domain. From black-hat hackers, script kiddies, hacktivists, and malicious insiders, to state-sponsored entities, they all operate by exploiting weaknesses.
Whether it is Malware, DDoS attacks, phishing, spoofing, and a plethora of other tactics are all refined to exploit specific weaknesses, technological, people, or process weaknesses.
Let's engrave this truth in our minds and on our walls: Every Attacker Leverages a Weakness, be it in our cyber defenses or physical security measures. There is no room for negotiation on this front.
Understanding this perspective shifts how we approach cybersecurity. It introduces a new dimension. We begin actively seeking out these weaknesses, gaining a deeper understanding of our infrastructure - a crucial aspect of cybersecurity. This new perspective can be the key differentiator between the attacker and us.
With this perspective, you’ll,
There are other perspectives too, such as Detection Perspective, Data Perspective, Attacker Perspective, User Perspective, Device Perspective, Network Perspective, Application Perspective, etc.
The Detection Perspective often relegates itself to a secondary role, presuming attacks are imminent and formulating strategies for countering them either during or after the attack. However, countering proves to be a monumental challenge, given the staggering diversity in attack methodologies, resulting in a near-certainty of oversight. I am making an important point here, ‘detection is secondary,’ while the entire industry focuses on the detection.
The Data Perspective places data at the core of every consideration, advocating for implementing measures to safeguard this invaluable asset. Yet, it grapples with parallel challenges to the Detection Perspective. Moreover, there's a crucial recognition that while data holds great importance, it does not encompass the entirety of an attack scenario.
The Attacker Perspective encounters its own constraints, stemming from the intricate nature of modeling every potential attacker and predicting their behavior, especially when there is a lack of a standardized method for characterizing attackers.
When it comes to the Device, Application, Network, and User Perspectives, each provides a valuable but limited viewpoint in the complex landscape of a multi-dimensional cyberinfrastructure.
Recommended by LinkedIn
Weakness Perspective
The Weakness Perspective embodies everything, barring the Detection Perspective. To study your weaknesses, you'll study your devices, your network, your data, your software, your users and their privileges, your security controls, your network, your attack surface, your threats, and potential attackers.
It is imperative that we turn our attention to these weaknesses and prioritize them in our cybersecurity measures. We term these weaknesses 'vulnerabilities', a concept familiar to us through Vulnerability Management. However, despite our efforts, attacks persist. Why is this the case?
Before delving into this question, let's first distinguish between two critical terms: "vulnerability" and "exposure". In the industry, I've noticed these words are often used interchangeably. Furthermore, there's a growing perspective that exposure management represents an elevated version of vulnerability management.
Consider this: when a vulnerability is exposed, it transforms into a potential threat. Therefore, risk can be quantified as the probability of a threat exploiting a vulnerability multiplied by its exposure.
Threat = Vulnerability x Exposure. So, Risk = Probability of Threat (Vulnerability x Exposure))
It is paramount to analyze vulnerabilities and exposures independently and in combination to gain a comprehensive understanding of threat dynamics. This nuanced examination provides invaluable insights into the potential risks an organization may face.
Why Vulnerability Management isn't Effective?
Coming back to our question, why Vulnerability Management isn't effective?
Firstly, our focus often narrows to what we commonly call 'software vulnerabilities'. While undeniably crucial, they represent only a portion of the vulnerabilities attackers are keenly aware of. Even here, our efforts fall short. Timely discovery and mitigation are often lacking, and we tend to rely on point solutions. It is not continuous or automated.
Secondly, a whole array of vulnerabilities often escapes our scrutiny. Misconfigurations, non-functioning security controls, unwanted or unnecessary IT components, posture anomalies - the list goes on. These hidden vulnerabilities are what attackers exploit, often with devastating consequences.
Consider the implications when an attack surface is vast, and an oversight in a seemingly obvious area leads to a catastrophic breach. This is why it's imperative that we shift our focus. Vulnerability, attack surface, and exposure management must take centre stage in our cyber defense program. Through a comprehensive understanding of these vulnerabilities and a proactive approach toward shoring up our defenses, we can safeguard our digital realms.
Every attacker exploits a vulnerability. Bring true Vulnerability and Exposure Management to the forefront and make it continuous and automated. Rethink cybersecurity from the weakness angle.
Research Scientist @ SecPod | Software Project Management, System Architecture
1yA insightful article to make us think and focus on what we can control in the domain of cyber security
EVP & Head of Department, IT Governance, Product & Technology, bKash Limited
1yGreat article, precisely articulated the real fact beyond the cyber security jargons. Hygiene is the best medicine.