Discovering the Source of Vulnerability Management Chaos

Part 3 of a multi-part series in controlling the chaos of vulnerability management.

Adam Dudley
May 24, 2021
Industry Perspectives

Are you in Vulnerability Scanner Data Hell?

The third of a multi-part series on controlling the chaos of vulnerability management. Read Part 1Ā and Part 2.

ImagineĀ yourselfĀ back inĀ gradeĀ school science class.Ā Depending on your memory or how well you paid attention (slacker!), you mightĀ recall the second law of thermodynamics. ItĀ saysĀ thatĀ entropy (i.e., disorderĀ or chaos) of systems always increases.

ThisĀ is a great way to think ofĀ the challenges faced by many organizations inĀ maturing a vulnerability managementĀ (VM)Ā program.Ā Chaos is the enemy of aĀ well-structured andĀ successful program.Ā AĀ chief source of chaos isĀ too muchĀ scan dataĀ without a way to manage it effectively. To illustrate thisĀ point,Ā we willĀ start at stage one ofĀ the VM process, Discover.

In the Discover stage,Ā scan data is often coming in from a disparate collection of scanning tools. Network, DAST, SAST, SCA, IAST, etc.Ā Not to mention vulnerability data coming in from other means of discovery includingĀ cloud,Ā compliance, pen testing, bug bounties, and disclosures. The sheer volume ofĀ sources andĀ scan and vulnerability data in a large enterprise can beĀ HUGEĀ and overwhelmingĀ for teamsĀ to deal with.

Absent a way to aggregateĀ and correlateĀ theĀ massiveĀ andĀ ever-increasingĀ volume of data, the chaos of your vulnerability management programĀ is guaranteed to increase.Ā (No fun for anyone!). To combat the chaos, some resource-starved security teamsĀ make doĀ withĀ primitive tools like spreadsheets, emails, and PDFs.Ā Anyone whoĀ hasĀ ever used this approach knowsĀ it isĀ like occupying a special rung of hell.

Better resourcedĀ security teamsĀ mightĀ succeed atĀ stitchingĀ together a Frankenstein Funnel or pipelineĀ for vulnerabilitiesĀ comprised of half a dozen or more tools. It mightĀ takeĀ inĀ raw scan data,Ā normalize, andĀ prioritize it.Ā ButĀ it does all thisĀ withoutĀ a lot of efficiency and often atĀ a higher than necessary cost.

TheĀ enrichedĀ data is then distributed around the organization to the parties concerned, leaving it to them to deal with it.Ā Making the security team in charge of vulnerabilities very unpopular!Ā While this is a step in the directionĀ ofĀ having a mature vulnerability management program,Ā it isĀ far fromĀ what a truly contemporary and scalable program can look like.

In most cases a sophisticated vulnerability aggregationĀ and response automation tool canĀ replace some of the pieces in a Frankenstein Funnel, streamlining and leveling up the program andĀ resulting in significant savings for the organization. For the less mature programs still using spreadsheets, this type of tool canĀ transform a VM program from immature to mature in very short order.

The problem is, this category of tool is relatively new and often either is unknown or gets confused with scanning, SIEM, or SOAR platforms. But now you know. And knowledge is power, but only with understanding. If you want to gain an understanding of how a vulnerability aggregation and automated response tool can transform your VM program, consider taking the Nucleus Demo on Demand available on your own terms and timing. Or, if you are not ready for that level of commitment, download our datasheet.

PART 1: SCANNING AIN’T PLANNING. Why you need more than just tools to manage vulnerabilities — Read Now.

Adam Dudley
Adam is VP of Strategy and Alliances at Nucleus Security, working closely with the company's partners and integrations. Adam is also proudly the company's longest-tenured non-founding employee.

See Nucleus in Action

Discover how unified, risk-based automation can transform your vulnerability management.