Once scanners are deployed, scans are scheduled and, reports are configured, one may ask, then what tasks vulnerability analysts/engineers perform?
So following are the tasks which are operationalized:
1. Authentication - Troubleshoot authentication issues.
2. Scan Coverage - Ensure scope for vulnerability scanning (cloud and on-premise) is defined and you are covering all the systems in scope. This may require co-relation with CMDB.
3. Offline Agents - Ensure the agents which are offline are of systems which are decommissioned. Agents can go offline due to variety of other reasons as well.
4. Reports - Normally, a lot of vulnerabilities are not patched by patching teams such as vulnerabilities related to 3rd party applications. They will patch vulnerabilities related to OS and corresponding native applications. Hence, you will always face requests to transfer ownership of such vulnerabilities. So, you will need to make changes to reports frequently if not regularly. You will also need to analyze reports to find assets which are not patched regularly (You can find out assets which are not onboarded in patching tools).
5. Policy Fine Tuning - There are vulnerabilities which require particular settings to detect them. Similarly, for compliance, there are controls which require modifications depending on the environment.
6. Managing False +ves and Exceptions - As scanning solutions have limitations hence, false +ves and exceptions will generate.
7. Rescan and Decommission requests - These tasks are performed on regular basis.
8. Weekly/Monthly calls with various stakeholders - Normally, current status of remediation efforts and challenges faced by application/platform teams are discussed.
9. Penetration and Audit findings - You will need to work with various teams to fix these findings.
10. VM Policy - Every organization has a policy where SLAs and critical assets are defined. You will need to create/fine tune such policies.
11. Deliver Trainings - As attack surface is ever evolving, you will need to give regular trainings on cybersecurity best practices (Phishing/Shift left approach/Safe browsing etc.).
12. Sync with TI - Be in sync with Threat Intelligence team and prioritize remediation according to their inputs.
Following are the tasks which are done on Ad hoc basis:
1. Scanner/Manager upgrade.
2. Troubleshoot connectivity issues between scanner and manager or agents and manager.
3. Deploy new scanner/manager
4. Integration with various tools such as the following:
- ITSM (e.g. ServiceNow)
- CMDB (e.g. ManageEngine)
- Risk Assessment (e.g. Kenna)
5. Task automation (e.g. Scripting using Python or VB)
Happy Learning !!