7.Endpoint Security
7.Endpoint Security
Organizations of all sizes are at risk from nation-states, hacktivists, organized crime,
and malicious and accidental insider threats. Endpoint security is often seen as
cybersecurity's frontline and represents one of the first places organizations look to
secure their enterprise networks.
As the volume and sophistication of cybersecurity threats have steadily grown, so has
the need for more advanced endpoint security solutions. Today’s endpoint
protection systems are designed to quickly detect, analyze, block, and contain attacks
in progress. To do this, they need to collaborate with each other and with other
security technologies to give administrators visibility into advanced threats to speed
detection and remediation response times.
When the EPP is set up, it can quickly detect malware and other threats. Some
solutions also include an Endpoint Detection and Response (EDR) component. EDR
capabilities allow for the detection of more advanced threats, such as polymorphic
attacks, fileless malware, and zero-day attacks. By employing continuous monitoring,
the EDR solution can offer better visibility and a variety of response options.
Vulnerability scanners aren’t the only way to gather system vulnerability data
anymore, though. Endpoint agents allow vulnerability management solutions to
continuously gather vulnerability data from systems without performing network
scans. This helps organizations maintain up-to-date system vulnerability data
whether or not, for example, employees’ laptops are connected to the
organization’s network or an employee’s home network.
After vulnerabilities are identified, they need to be evaluated so the risks posed
by them are dealt with appropriately and in accordance with an organization’s
risk management strategy. Vulnerability management solutions will provide
different risk ratings and scores for vulnerabilities, such as Common
Vulnerability Scoring System (CVSS) scores. These scores are helpful in telling
organizations which vulnerabilities they should focus on first, but the true risk
posed by any given vulnerability depends on some other factors beyond these
out-of-the-box risk ratings and scores.
Like any security tool, vulnerability scanners aren’t perfect. Their vulnerability
detection false-positive rates, while low, are still greater than zero. Performing
vulnerability validation with penetration testing tools and techniques helps weed out
false positives so organizations can focus their attention on dealing with real
vulnerabilities. The results of vulnerability validation exercises or full-blown
penetration tests can often be an eye-opening experience for organizations that
thought they were secure enough or that the vulnerability wasn’t that risky.
Once a vulnerability has been validated and deemed a risk, the next step is
prioritizing how to treat that vulnerability with original stakeholders to the
business or network. There are different ways to treat vulnerabilities, including:
When remediation activities are completed, it’s best to run another vulnerability
scan to confirm that the vulnerability has been fully resolved.
Every time you get a new affiliate partner, employee, client or customer, you open
up your organization to new opportunities, but you’re also exposing it to new
threats. Protecting your organization from these threats requires a vulnerability
management solution that can keep up with and adapt to all of these changes.
Without that, attackers will always be one step ahead.
Quarterly – population (4)- sample size- (2) – We must check if review was performed as a part of
TOD & TOE for each quarter.
If scans are performed automatically, will see frequency of scans and will check scans are performed
as per schedule or not.
Common areas that will need patches include operating systems, applications, and embedded
systems (like network equipment). When a vulnerability is found after the release of a piece of
software, a patch can be used to fix it. Doing so helps ensure that assets in your environment
are not susceptible to exploitation.
Security: Patch management fixes vulnerabilities on your software and applications that are
susceptible to cyber-attacks, helping your organization reduce its security risk.
System uptime: Patch management ensures your software and applications are kept up-to-date and
run smoothly, supporting system uptime.
Compliance: With the continued rise in cyber-attacks, organizations are often required by regulatory
bodies to maintain a certain level of compliance. Patch management is a necessary piece of adhering
to compliance standards.
Feature improvements: Patch management can go beyond software bug fixes to also include
feature/functionality updates. Patches can be critical to ensuring that you have the latest and
greatest that a product has to offer.
We have check if patches are updated for all the systems and servers regularly or at least
once in the reporting period as per the control requirement (Hotfixes)