SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
CYBER RISK
REDUCTION SERIES
01.01

SOFTWARE BASED
VULNERABILITITES
Overview
Organizations
continuously face risk
rooted in an increasing
and evolving set of threat
vectors. These threat
vectors aggregate to
create an overall attack
surface area. Reducing the underlying vulnerabilities results in a
reduced attack surface area. This reduction limits adversaries’
ability to exploit vulnerabilities and impact what your
organization has identified as valuable.
ClearArmor
ClearArmor™ Corporation
519 Easton Rd.
Riegelsville, PA 18077
info@cleararmor.com
http://www.cleararmor.com
+1-(610) 816-0101
Step 1 – Accept that no risk reduction is sustainable possible without a structured
CyberSecurity program. That Program must be based on a recognized standard.
The most accepted standard is the NIST CyberSecurity Framework (CSF).
Step 1- Structure and Standards are foundational to CyberSecurit
Step 2 – A structured CyberSecurity program requires process, technology, and
governance. ClearArmor CyberSecurity Resource Planning (CSRP) is the only
solution that truly aligns organizations to the NIST CSF. This is achieved by
ClearArmor’s Momentum Methodology (M2) and the Intelligent CyberSecurity
Platform (ICSP).
Step 2 - Process, Technology, and Governance are foundational to CyberSecurity
Step 3 – Assign Ownership to all NIST CSF Functions, Categories, and Sub-
Categories. These are the ‘Things’ that organizations must do to ensure
‘CyberSecurity’. Ownership requires a Responsible Role (Responsible for Doing)
and an Accountable Rile (Responsible for Auditing). By assigning ownership,
organizations are able to comply with guidance provide by the NIST CSF.
Step 3- Assignment of Accountable and Responsible Roles are foundational to CyberSecurity
Step 4 – Policy - establish your organizations software patching, upgrade policy.
A subset of this will include maximum durations for remediations to reach
production, testing guidance, and methods to distribute software patches.
Step 4 – Creation of clearly defined policy is foundational to CyberSecurity
2 Copyright © 2018 Clear Armor Corporation. All Rights Reserved
Step 5 – Discovery your entire network. This includes, but is not limited to, all
hardware, software, configuration information, used ports, utilization, etc. This
requires technology and process that are complete. Only the ClearArmor
Discovery, Classification, Indentification (DCI) process achieves a level of insight
into your organizations networked assets, software, hardware, utilization that is
instrumental to a significant number of NIST CSF sub-categories.
Step 5 – Discovery is foundational to CyberSecurit
Step 6 – Categorization is critical to achieving focused efforts. Quantities of
active vulnerabilities in an organization can be staggering. Lack of prioritization
of efforts increases risk and the likelihood of a successful exploit. In the
ClearArmor ICSP, categorization occurs at three levels.
 Level 1 – Automated Categorization based on device type (Network
Devices, Storage Device, Workstation device, Server Device)
 Level 2 – White Listing – Devices are initially not listed. Through automations
or manual methods, all endpoints are identified as ‘White Listed’, ‘Limited
Duration White Listed’, or ‘Black Listed’.
 Level 3 – Landscape (Examples: Production, QA, Test, Dev1, Dev2, Patch)
 Level 4 – System Membership (Example: HRIS, ERP, AD, eMail, BI, etc)
Last, ClearArmor provides organizations with a workflow that allows organizations
to categorize Risk Imperatives – to – Business Functions – to – Systems – to
Endpoints Based on this ability, it is possible to focus remediations that directly
relate to business risk imperatives, business functions, systems, or landscapes.
Step 6- Categorization is foundational to CyberSecurity
Step 7 – Precision Identification of Vulnerabilities is achieved through our
 advanced automated software discovery and identification. This goes
beyond typical methods that only go as far are reading registry
information. The ClearArmor discovery process includes all executables,
services, dll’s, and other types of files to gain greater understanding of
what is installed where. All software, all version information, all distribution
across the organization. At this stage a baseline of the preliminary
vulnerability information is achieved, allowing for progress measurement.
 Consumption of our Proprietary IT-Pedia data, the de facto source for
understanding critical information such as associated NIST Identified
vulnerabilities, end of support, end of sales, end of life, and a multitude of
other information. If a new device, software package, vulnerability, or
other details are identified in the wild, we bring that information down into
your installation of the ICSP.
Step 7- Identification of vulnerabilities is a critical element of all CyberSecurity Programs
3 Copyright © 2018 Clear Armor Corporation. All Rights Reserved
Step 8 – Review the discovered vulnerabilities in any number of ways, by
distribution across the organization, by severity, by location, by type of devices,
by category of device, etc. Every organization will prioritize their remediation
targets differently. There is no one right way. At first this will seem to be
overwhelming, once your organization has adopted its patching and
vulnerability remediation process, and has begin to remediate issues, the noise
and information will begin to calm.
Step 8- Assessing active vulnerabilities is a critical element of all CyberSecurity Programs
Step 9 – Target the vulnerabilities to remediate, following your organizations
policy. This may change after initial work efforts are underway. More specifically,
the organization may focus on mitigating the top ‘X’ % of impacted software
packages. In many cases an initial focus may eliminate a large percentage of
existing issues. After this first pass, the organization may go through a series of
passes aimed at high importance systems.
Additionally, the data available to your organization is significant at this point. It
provides you with the ability to visualize the problem, target the solution, and
catalytically enable your patching solutions to successfully operate.
Step 9- Focused efforts are a key to cost effectively reducing risk
Step 10 – As your endpoints are patched or software is upgrades, the discovery
process will automatically pick up changes through the organization. Daily
review off changes to your current vulnerabilities provide the ability to
continuously remediate and assess success.
Step 10 – Vulnerability remediation is a recurring process of a structured CyberSecurity Program
ClearArmor CSRP is CyberSecurity
See your Active Vulnerabilities
4 Copyright © 2018 Clear Armor Corporation. All Rights Reserved
Assign CyberSecurity Ownership Across Your Organization
See Detailed Information on All Active Vulnerabilities
See Detailed Information on the affected Endpoints
Understand the Number of distinct Version affected by the Vulnerability and the Distribution across your organization
5 Copyright © 2018 Clear Armor Corporation. All Rights Reserved
CyberSecurity Resource Planning
CSRP = Methodology + Technology
A structured approach to CyberSecurity

Mais conteúdo relacionado

Mais procurados

Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 

Mais procurados (20)

The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Software Vulnerability management
Software Vulnerability management Software Vulnerability management
Software Vulnerability management
 
Vulnerability Malware And Risk
Vulnerability Malware And RiskVulnerability Malware And Risk
Vulnerability Malware And Risk
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
Vulnerability Assessment Presentation
Vulnerability Assessment PresentationVulnerability Assessment Presentation
Vulnerability Assessment Presentation
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Effective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security ControlsEffective Cyber Defense Using CIS Critical Security Controls
Effective Cyber Defense Using CIS Critical Security Controls
 
Web Application Vulnerability Management
Web Application Vulnerability ManagementWeb Application Vulnerability Management
Web Application Vulnerability Management
 
10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program10 Steps to Building an Effective Vulnerability Management Program
10 Steps to Building an Effective Vulnerability Management Program
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
How to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organizationHow to implement NIST cybersecurity standards in my organization
How to implement NIST cybersecurity standards in my organization
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 

Semelhante a Software Vulnerabilities Risk Remediation

201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
Allan Crowe PCIP
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
Invincea, Inc.
 

Semelhante a Software Vulnerabilities Risk Remediation (20)

ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIESClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
ClearArmor CSRP - 01.01 SOFTWARE BASED VULNERABILITIES
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Lastline Case Study
Lastline Case StudyLastline Case Study
Lastline Case Study
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Bit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_printBit defender ebook_secmonitor_print
Bit defender ebook_secmonitor_print
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)How to Build and Validate Ransomware Attack Detections (Secure360)
How to Build and Validate Ransomware Attack Detections (Secure360)
 
Tech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Security Testing In The Secured World
Security Testing In The Secured WorldSecurity Testing In The Secured World
Security Testing In The Secured World
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 

Último

Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
daisycvs
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 

Último (20)

Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
Escorts in Nungambakkam Phone 8250092165 Enjoy 24/7 Escort Service Enjoy Your...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDINGPuri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
Puri CALL GIRL ❤️8084732287❤️ CALL GIRLS IN ESCORT SERVICE WE ARW PROVIDING
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 

Software Vulnerabilities Risk Remediation

  • 1. CYBER RISK REDUCTION SERIES 01.01  SOFTWARE BASED VULNERABILITITES Overview Organizations continuously face risk rooted in an increasing and evolving set of threat vectors. These threat vectors aggregate to create an overall attack surface area. Reducing the underlying vulnerabilities results in a reduced attack surface area. This reduction limits adversaries’ ability to exploit vulnerabilities and impact what your organization has identified as valuable. ClearArmor ClearArmor™ Corporation 519 Easton Rd. Riegelsville, PA 18077 info@cleararmor.com http://www.cleararmor.com +1-(610) 816-0101 Step 1 – Accept that no risk reduction is sustainable possible without a structured CyberSecurity program. That Program must be based on a recognized standard. The most accepted standard is the NIST CyberSecurity Framework (CSF). Step 1- Structure and Standards are foundational to CyberSecurit Step 2 – A structured CyberSecurity program requires process, technology, and governance. ClearArmor CyberSecurity Resource Planning (CSRP) is the only solution that truly aligns organizations to the NIST CSF. This is achieved by ClearArmor’s Momentum Methodology (M2) and the Intelligent CyberSecurity Platform (ICSP). Step 2 - Process, Technology, and Governance are foundational to CyberSecurity Step 3 – Assign Ownership to all NIST CSF Functions, Categories, and Sub- Categories. These are the ‘Things’ that organizations must do to ensure ‘CyberSecurity’. Ownership requires a Responsible Role (Responsible for Doing) and an Accountable Rile (Responsible for Auditing). By assigning ownership, organizations are able to comply with guidance provide by the NIST CSF. Step 3- Assignment of Accountable and Responsible Roles are foundational to CyberSecurity Step 4 – Policy - establish your organizations software patching, upgrade policy. A subset of this will include maximum durations for remediations to reach production, testing guidance, and methods to distribute software patches. Step 4 – Creation of clearly defined policy is foundational to CyberSecurity
  • 2. 2 Copyright © 2018 Clear Armor Corporation. All Rights Reserved Step 5 – Discovery your entire network. This includes, but is not limited to, all hardware, software, configuration information, used ports, utilization, etc. This requires technology and process that are complete. Only the ClearArmor Discovery, Classification, Indentification (DCI) process achieves a level of insight into your organizations networked assets, software, hardware, utilization that is instrumental to a significant number of NIST CSF sub-categories. Step 5 – Discovery is foundational to CyberSecurit Step 6 – Categorization is critical to achieving focused efforts. Quantities of active vulnerabilities in an organization can be staggering. Lack of prioritization of efforts increases risk and the likelihood of a successful exploit. In the ClearArmor ICSP, categorization occurs at three levels.  Level 1 – Automated Categorization based on device type (Network Devices, Storage Device, Workstation device, Server Device)  Level 2 – White Listing – Devices are initially not listed. Through automations or manual methods, all endpoints are identified as ‘White Listed’, ‘Limited Duration White Listed’, or ‘Black Listed’.  Level 3 – Landscape (Examples: Production, QA, Test, Dev1, Dev2, Patch)  Level 4 – System Membership (Example: HRIS, ERP, AD, eMail, BI, etc) Last, ClearArmor provides organizations with a workflow that allows organizations to categorize Risk Imperatives – to – Business Functions – to – Systems – to Endpoints Based on this ability, it is possible to focus remediations that directly relate to business risk imperatives, business functions, systems, or landscapes. Step 6- Categorization is foundational to CyberSecurity Step 7 – Precision Identification of Vulnerabilities is achieved through our  advanced automated software discovery and identification. This goes beyond typical methods that only go as far are reading registry information. The ClearArmor discovery process includes all executables, services, dll’s, and other types of files to gain greater understanding of what is installed where. All software, all version information, all distribution across the organization. At this stage a baseline of the preliminary vulnerability information is achieved, allowing for progress measurement.  Consumption of our Proprietary IT-Pedia data, the de facto source for understanding critical information such as associated NIST Identified vulnerabilities, end of support, end of sales, end of life, and a multitude of other information. If a new device, software package, vulnerability, or other details are identified in the wild, we bring that information down into your installation of the ICSP. Step 7- Identification of vulnerabilities is a critical element of all CyberSecurity Programs
  • 3. 3 Copyright © 2018 Clear Armor Corporation. All Rights Reserved Step 8 – Review the discovered vulnerabilities in any number of ways, by distribution across the organization, by severity, by location, by type of devices, by category of device, etc. Every organization will prioritize their remediation targets differently. There is no one right way. At first this will seem to be overwhelming, once your organization has adopted its patching and vulnerability remediation process, and has begin to remediate issues, the noise and information will begin to calm. Step 8- Assessing active vulnerabilities is a critical element of all CyberSecurity Programs Step 9 – Target the vulnerabilities to remediate, following your organizations policy. This may change after initial work efforts are underway. More specifically, the organization may focus on mitigating the top ‘X’ % of impacted software packages. In many cases an initial focus may eliminate a large percentage of existing issues. After this first pass, the organization may go through a series of passes aimed at high importance systems. Additionally, the data available to your organization is significant at this point. It provides you with the ability to visualize the problem, target the solution, and catalytically enable your patching solutions to successfully operate. Step 9- Focused efforts are a key to cost effectively reducing risk Step 10 – As your endpoints are patched or software is upgrades, the discovery process will automatically pick up changes through the organization. Daily review off changes to your current vulnerabilities provide the ability to continuously remediate and assess success. Step 10 – Vulnerability remediation is a recurring process of a structured CyberSecurity Program ClearArmor CSRP is CyberSecurity See your Active Vulnerabilities
  • 4. 4 Copyright © 2018 Clear Armor Corporation. All Rights Reserved Assign CyberSecurity Ownership Across Your Organization See Detailed Information on All Active Vulnerabilities See Detailed Information on the affected Endpoints Understand the Number of distinct Version affected by the Vulnerability and the Distribution across your organization
  • 5. 5 Copyright © 2018 Clear Armor Corporation. All Rights Reserved CyberSecurity Resource Planning CSRP = Methodology + Technology A structured approach to CyberSecurity