Vulnerability Data in RBA Framework #86
Replies: 1 comment 6 replies
-
I like the idea of having this live in a lookup file, that way its easy to update as vulnerabilities are remediated and no longer pose an active risk. And maybe keep a little overlap in coverage, like 7 days, in the event someone was able to take advantage of a vulnerability and got persistence but was slow in the rest of their attack. You would want the vuln. scans sent to splunk automatically and then build a search that writes the info you want to the lookup file. Or you could do it manually but that would be a pain long term. Then in your risk incident rule, pull that data in using the lookup command and add a manual risk score based on the severity of the vulnerability and device. |
Beta Was this translation helpful? Give feedback.
-
Hello all- long-time RBA practitioner, first-time caller here... I was curious what the community's thoughts were on utilizing vulnerability scan data in an RBA deployment. The idea was raised within my org, and my initial thought was finding a way to implement as a risk factor, but I'm struggling to wrap my head around how to get data from the vulnerability scanner logs (preferably via the Splunk data model) to eventually feed into risk factor calculations.
The other idea proposed was to implement this data as a risk rule itself, which could be the simpler route provided we limit/suppress how often it adds risk to the ecosystem.
Thanks in advance, looking forward to hearing any thoughts or feedback!
Beta Was this translation helpful? Give feedback.
All reactions