security

Why Vulnerability Management Needs A Patch In The Modern Tech … – Spiceworks News and Insights


It is a fact that vulnerability management is not equipped for modern DevOps environments. While there’s no shortage of new CVE discoveries year over year, the majority of the stack is not covered by CVEs, as most AppSec vulnerabilities are never reported. Rickard Carlsson, co-Founder and CEO of Detectify, shares why vulnerability management strategies and tools need to evolve for the modern tech stack to provide smarter security and effective threat management.

The modern tech stack is extremely diverse and creates an attack surface that is very difficult to manage. With organizations going fully serverless and leveraging multicloud, security teams have been tasked with defending an expanding, complex surface area and found out the hard way that many popular, proposed solutions don’t get the job done. There is now a clash between established methods that have been part of ISMSs for a long time, including vulnerability management, and what is needed to protect a more modern stack, such as DevSecOps. Security teams that rely on CVE disclosure processes and CVSS as rating methods for application security soon figure out that it doesn’t really work for modern stacks.

 So, why isn’t vulnerability management up to the job? 

1. The CVSS Rating Method Is Flawed for AppSec

Most cybersecurity teams use the Common Vulnerability Scoring System (CVSS) to prioritize vulnerability management operations. A CVSS score is a value from zero and ten that demonstrates how easily a vulnerability can be exploited and the potential impact of a successful exploit. It is calculated using three metrics groups: Base, Temporal, and Environmental, which look at the various characteristics of a vulnerability, such as its impact and environmental durability through time. This public scoring system has become the industry standard for rating vulnerabilities.

However, while the CVSS has its uses, it was never meant to be used for vulnerability prioritization for application security as it doesn’t provide enough granular separation of attacks. The model typically assigns a basic score to a vulnerability within two weeks of its discovery, but these values remain static and are seldom revisited after this first evaluation, regardless of changes in the threat landscape or additional research.

So why do many security teams still rely on it? The answer is simple – it was what they had. As vulnerabilities became more common and security teams found themselves unable to fix every issue as it occurred, they needed a rating system of some kind to help them prioritize. They adopted CVSS as a prioritization metric because it was all they had at the time. However, because CVSS was never intended for this purpose, security teams are increasingly wasting time and resources remediating vulnerabilities that represent little to no risk and failing to prioritize others that may represent a great deal of risk to the business. 

See More: Unlocking a More Secure Cloud: An Introduction to Security as Code (SaC)

2. CVEs Have Poor Coverage

Application vulnerabilities are consistently the most common threat vector targeted by attackers. According to Verizon’s 2022 Data Breach Investigations ReportOpens a new window