VM Remediation using external task tracking systems

VM Remediation using external task tracking systems. In previous post I have briefly reviewed built-in remediation capabilities of vulnerability management systems. Continuing the theme, today I want to share some basic concepts how vulnerability remediation can be managed using external task tracking systems (Jira, TFS, Testrack, etc).

Jira Vulnerability Management ticket

Pros: it makes possible to implement any logic of remediation/patch management process.
Cons: you should make it by yourself; scripting skills and API knowledge required.

Tickets in buit-in remediation systems are usually assigned per host or per vulnerability. However, for large size networks making “one vulnerability on one host – one ticket” quickly become impractical. With universal task trackers we can do it in a different ways. I find it most convenient to make tickets on principle “one category of vulnerabilities, one ip range, one scanning iteration – one ticket”.

Category of vulnerabilities may depend on the vulnerability types, ways of remediation and criticality. For example, it can be a type of detection plugin “Windows security bulletins” or more complex “Windows security bulletins with high/critical vulnerabilities and available public exploits”).

Splitting scan results

IP range depends on the particular group of administrators who will solve the issue. As a rule, it is not practical to make one large task for various administrators groups. This may lead to blurring of responsibility.

Iteration number depends on the scan frequency in organization: once a month, week, day, etc. For weekly scans you can use calendar week number.

Thus, in ticket title will be something like “Windows security bulletins with exploitable high/critical vulnerabilities – Boston Office – Scan 23”. You can also assign a ticket identifier that uniquely characterizes the range, iteration and category of vulnerabilities.

Ticket Scheme

In description of the ticket you can specify statistics for the vulnerable hosts:

  • Top 5-10 most vulnerable hosts (“pay special attention to them”)
  • The number of vulnerable  hosts (“current situation”)
  • The number of new vulnerable hosts emerged from the last scan (“patch it to close the ticket!”)
  • The number of hosts that become safe since the last scan (“good job – patch management process is working”)
  • The number of vulnerable hosts, that were vulnerable in the last scan and now remains vulnerable (“lack of patch management process”)

It is assumed that administrators will patch only new vulnerabilities within the ticket. Older vulnerabilities should be fixed in previous ticket, where they have been detected for the first time. It is may be convenient to add references to the previous and next scan tickets for easy navigation.

Tickets linking

Complete lists of the hosts and vulnerabilities may be attached to the ticket. It is easy to produce such differential reports with scan results, collected, for example, using Nexpose API, presented in parsable form. For example, in csv containing the fields:

  • ip-address
  • hostname
  • category of vulnerability
  • vulnerabilit id (detection plugin id)
  • vulnerability title
  • vulnerability description

7 thoughts on “VM Remediation using external task tracking systems

  1. Pingback: Retrieving scan results with Nessus API | Alexander V. Leonov

  2. Pingback: Retrieving scan results through Nessus API | Alexander V. Leonov

  3. Pingback: Nessus V2 xml report format | Alexander V. Leonov

  4. Pingback: F-Secure Radar Ticketing | Alexander V. Leonov

  5. Pingback: ZeroNights16: Enterprise Vulnerability Management | Alexander V. Leonov

  6. Pingback: Automated task processing with JIRA API | Alexander V. Leonov

  7. Pingback: Rapid7 Nexpose in 2017 | Alexander V. Leonov

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.