Vulnerability Management Procedure - Montana

1y ago
4 Views
1 Downloads
531.88 KB
6 Pages
Last View : 3m ago
Last Download : 3m ago
Upload by : Randy Pettway
Transcription

STATE OF MONTANAMontana Information Security Advisory CouncilBest Practices / Tools Workgroup – Vulnerability Management ProcedureVulnerability Management Procedure1Version 11-17-2016

STATE OF MONTANAMontana Information Security Advisory CouncilBest Practices / Tools Workgroup – Vulnerability Management Procedure1. PurposeThis procedure identifies the process for vulnerability management to protectinformation systems against known vulnerabilities.2. ScopeThis procedure applies to enterprise systems. The Information Security Policy requiresall systems to routinely be updated and patched.3. PolicyVulnerability Management Procedure applies to the following controls found within theInformation Security Policy.a. Information Security Policy Identifyo 1.7, 1.8 Protecto 2.9.7, 2.10, 2.11.6, 2.17 Detecto 3.1b. Information Security Policy – Appendix A Audit and Accountability (AU)o AU-6 – Audit Review, Analysis, and Reporting Configuration Management (CM)o CM-3 – Configuration Change Controlo CM-6 – Configuration Settingso CM-9 – Configuration Management Plan Risk Assessment (RA)o RA-5 - Vulnerability Scanning System and Information Integrity (SI)o SI-2 – Flaw Remediation (Patch Management)o SI-5 – Security Alerts, Advisories, and Directiveso SI-7 – Software, Firmware, and Information Integrity4. Recommended Best-Practices to be Adopted as Standard ConfigurationSecurity vulnerabilities are identified on a daily occurrence. State agencies shallproactively manage vulnerabilities of systems to reduce or eliminate the potential forexploitation.A.Monitoring Vulnerabilities2Version 11-17-2016

STATE OF MONTANAMontana Information Security Advisory CouncilBest Practices / Tools Workgroup – Vulnerability Management ProcedureState agencies are responsible for reviewing and monitoring new patchreleases through announcements and notifications from SITSD’s SecurityInformation Alerts. Agencies should also consider monitoring the following: notifications from vendors, and Security web sitesB.Vulnerability CommunicationFor enterprise wide vulnerability communications SITSD’s Information SecurityBureau (ISB) will determine the need for communication of vulnerabilities toagencies. This communication will be sent through the SITSD Service Desk.The agency will then communicate vulnerabilities to individuals as necessary.This will be dependent upon the vulnerability and the systems to which theypertain.Vulnerability communication is conducted in more than one method:o Emailo Network Managers Meeting (NMG)o MT-ISAC and ITMC meetingso Agency Technical and or Supervisor meetingso Meetings with the businessC.Vulnerability RemediationRemediation for vulnerabilities will be deployed to all systems that have thevulnerability, even for systems that are not at immediate risk of exploitation.Remediation for vulnerabilities will also be incorporated into the standard buildsand configurations for hosts. There are three primary methods of remediationthat can be applied to an affected system: the installation of a software patch,the adjustment of a configuration setting, or the removal of the affectedsoftware.1. Patch Management will be conducted as follows: Agency shall assign staff or contracted services that will: Manage and maintain system updates for agency systems. Deploy patches for appropriate systems using enterprise approvedmethods or tools Review security patches, determine their applicability to agencysystems, and communicate necessary patches to appropriate staff.3Version 11-17-2016

STATE OF MONTANAMontana Information Security Advisory CouncilBest Practices / Tools Workgroup – Vulnerability Management Procedure Initialize testing of security patchesDistribute patches to vulnerable systemsAll agencies shall use the following chart when determining alert level whendistributing information about the patch:o RED – Immediately within 48 hours or two working dayso Orange – As Soon as Possible (next General Maintenance Window)o Yellow – Within one Month2. Configuration SettingAgency will monitor information from various sources to determine the needfor system configuration setting changes. System configuration changesare generally a result of vulnerability scans or vendor communications.The process that agencies will follow as it relates to configuration settingchanges: The agency security officer receives information regarding aconfiguration setting from a vulnerability scan or a communicationfrom the vendor. The agency security officer will discuss the configuration change withsystem owner experts. A determination will be made as to whether the configuration will bechanged. If it is not to be changed, this should be noted and thereason for not making the change in the agency changemanagement or risk assessment application. If the change is goingto be made, agencies will follow their Change Management Process.3. Removal of affected softwareAgency will monitor information from various sources to determine the needfor software removal. An example of this would be the use of non-standardsoftware on an agency computer. This is the process that the agency willfollow as it relates to software removal: The agency security officer receives information regarding software thatmay need to be removed from systems.4Version 11-17-2016

STATE OF MONTANAMontana Information Security Advisory CouncilBest Practices / Tools Workgroup – Vulnerability Management Procedure D.The agency security officer will discuss the software removal withvarious system owner expertsA determination will be made as to whether the software will beremoved. If it is determined that the software will not be removed, thisshould be noted and the reason for not removing the software in theagency change management or risk assessment application. If thesoftware is to be removed, a service request is to be made and assignedto the appropriate group for the software to be removedSoftware shall be removed when it is end of life and no longersupported.Verification of RemediationThe agency will verify vulnerability remediation through the use of serval methods: Patch Managemento Verify patch installation by auditing patch logs or automated softwarereports Configuration Managemento Verify that files or configuration changes remediated the vulnerability.o Review change management reports for removal of affected softwarefrom devices.o Credentialed scan of host with vulnerability scanner that is capable ofdetecting known vulnerabilitieso Perform annual vulnerability scanning.5. ComplianceCompliance shall be evidenced by implementing Vulnerability ManagementProcedure as described above. Policy changes or exceptions are governed by theProcedure for Establishing and Implementing Statewide Information TechnologyPolicies and Standards. Requests for a review or change to this VulnerabilityManagement Procedure are made by submitting an Action Request form.Requests for exceptions are made by submitting an Exception Request form.Changes to policies and standards will be prioritized and acted upon based onimpact and need.5Version 11-17-2016

STATE OF MONTANAMontana Information Security Advisory CouncilBest Practices / Tools Workgroup – Vulnerability Management ProcedureChanges since version 09-07-2016Page 5 – in Removal of affected software section – added last bullet - Software shall beremoved when it is end of life and no longer supported. This was added upon approvalof MT-ISAC by Mr. Daugherty6Version 11-17-2016

Best Practices / Tools Workgroup - Vulnerability Management Procedure 1. Purpose This procedure identifies the process for vulnerability management to protect information systems against known vulnerabilities. 2. Scope This procedure applies to enterprise systems. The Information Security Policy requires

Related Documents:

Kandy. The highest vulnerability (0.45: moderate vulnerability) to dengue was indicated from CMC and the lowest indicated from Galaha MOH (0.15; very low vulnerability) in Kandy. Interestingly the KMC MOH area had a notable vulnerability of 0.41 (moderate vulnerability), which was the highes

MONTANA NONPROFIT ASSOCIATION, INC A Montana Nonprofit Public Benefit Corporation BYLAWS ARTICLE I NAME 1.01 Name. The name of this Corporation shall be Montana Nonprofit Association, Inc. The business of the Corporation may also be conducted as Montana Nonprofit Association or Mo

Vulnerability Management solution available on demand Software-free, management free solution - Auto-updating - No software to install or maintain Industry's most comprehensive Vulnerability KnowledgeBase 3700 vulnerability signatures, updated daily Most accurate vulnerability scanner with less than .003% false positive rate

Common Vulnerability Scoring System (CVSS) values o Numerical score reflecting the severity of the vulnerability Results The associated CVSS score attached to each vulnerability by the NVD provides organizations with a visible metric to gauge the severity associated with any vulnerability and help prioritize any threat remediation strategies.

facilitating system vulnerability assessment incorporates a single, graphical representation of a system. This system representation is provided to multiple risk/vulnerability assessment tools and vulnerability data or knowledge bases, resulting in a single, consolidated input to multiple tools. A Fuzzy E xpert System applies the unique correlation

Low 3.50 Pass Note to scan customer: This vulnerability is purely a denial-of-service vulnerability and it is not considered a failing condition under the PCI DSS. 10 23.229.184.1 (www. dumbbellshealth club.com) SSL Weak Encryption Algorithms Low 1.80 Pass Note to scan customer: This vulnerability is not recognized in the National Vulnerability .

Montana Prescription Drug Registry Children, Families, Health and Human Services Interim Committee 63rd Montana Legislature November 15, 2013. Marcie Bough, PharmD Executive Director, Montana Board of Pharmacy . Montana Prescription Drug Registry (MPDR) PO Box 200513 Helena, MT 59620 Phone: 406-841-2240 Fax: 406-841-2344

ADVANCED ENGINEERING MATHEMATICS By ERWIN KREYSZIG 9TH EDITION This is Downloaded From www.mechanical.tk Visit www.mechanical.tk For More Solution Manuals Hand Books And Much Much More. INSTRUCTOR’S MANUAL FOR ADVANCED ENGINEERING MATHEMATICS imfm.qxd 9/15/05 12:06 PM Page i. imfm.qxd 9/15/05 12:06 PM Page ii. INSTRUCTOR’S MANUAL FOR ADVANCED ENGINEERING MATHEMATICS NINTH EDITION ERWIN .