Sunday, February 9, 2025

Vulnerability Management - Blind Spot

A blind spot refers to a gap in the scanning process or the areas of a system, network, or application that are not adequately tested for vulnerabilities.

One use case to cover blind spot:
Suppose there are some ESXi hosts with restricted access managed by a vCenter. Here, you can authenticate to the vCenter and gather details of the ESXi hosts such as build, version number, and configuration details.

Please refer the Qualys blog for more details:
https://blog.qualys.com/product-tech/2024/12/17/whats-new-in-qualys-vmdr-2024-edition

Happy Learning !!
hashtagCyberSecurity hashtagVulnerabilityManagement hashtagQualys

Vulnerability Management - Core responsibilities of IVM team

Infrastructure vulnerability management team has a lot of responsibilities but following are the core ones on which there cannot be any compromise:

1. Asset coverage ->
Vulnerability scanning should cover as many assets as possible

2. Vulnerability coverage ->
Ensure as many vulnerabilities are detected as possible (Hint - Authentication and fine tuned option/scan profiles)

3. Prioritization ->
Enrich vulnerability data with threat intel and asset context (Not all vulnerabilities are to be remediated)

4. Ensuring that reports reach all the relevant stakeholders ->
If platform teams do get reports then they cannot act

Now, why did I bring this up? In MNCs, higher management will try to put you under pressure by asking you to prepare various decks despite various dashboards being present in the tool itself. Reporting consumes a lot of time especially when different people in higher management need different reports for the same dataset.

Now, it is your responsibility to balance the pressure. Try to contribute as much as possible but remember there is a threshold. Whenever you observe that your core responsibilities have started lagging, clearly say 'NO' to such asks.

Yes, you heard me right. IVM team's runbook is like a constitution. Different people will reach out to you with different asks but we have to abide by a runbook which is agreed with the client.

Remember, vulnerability management does NOT mean to play with numbers, rather its intent is to reduce cybersecurity risk of an environment. I understand the commercial aspect of running a business/service but we cannot compromise on our core responsibilities.

In case of doubt, ask yourself, would you want to hold yourself responsible in case of a breach/cyberattack? If the answer is 'No' then there shouldn't be any compromise/negligence in your core responsibilities.

hashtagVulnerabilityManagement hashtagCybersecurity

Excel VBA - Timing Complexity (Part - 2)

If you are handling a huge dataset and your program is taking too much time to run, then you can use the following trick:

Application.Calculation = xlCalculationManual
' Put your code here
Application.Calculation = xlCalculationAutomatic

Refer the below URLs to know more about Excel's 'Calculation' property:
https://learn.microsoft.com/en-us/office/vba/excel/concepts/excel-performance/excel-improving-calculation-performance

Happy Learning !!
hashtagMSExcel hashtagExcel hashtagVBA hashtagMicrosoft

Wednesday, December 25, 2024

Vulnerability Management - False Positive Analysis

False positive analysis in VM involves identifying and investigating vulnerabilities flagged by scanning tools that are not actual security issues. These can stem from misconfigurations, incorrect detections, or outdated signatures in scanning tools.


Attached is the document with few use cases.
Source - ChatGPT

Happy Learning !!
hashtagVulnerabilityManagement hashtagCybersecurity

Vulnerability Management - High Level Qualys Deployment Plan

Planning a Qualys deployment in a large-scale organization requires a meticulous approach to ensure scalability, efficiency, and alignment with the organization’s security goals. Please find attached document for a comprehensive plan.


Happy Learning !!
hashtagVulnerabilityManagement hashtagCyberSecurity hashtagQualys

Vulnerability Management - Understanding vulnerability posture

Understanding the vulnerability posture of an organisation at a basic level helps you drive remediation efforts. So, I don't know what t...