blog

Why Prioritize vulnerability? A case for Risk and Contextual-based prioritization for application security and Cloud Security

AppSec Phoenix Risk Based Context Based Priorities in application security and cloud security

AppSec Phoenix Risk Based Context Based Priorities in application security and cloud security
AppSec Phoenix Risk Based Context Based Priorities in application security and cloud security.

Vulnerabilities have been increasing in number year on year, precisely 34%, according to MITRE CVE statistics. 

FIRST/CVE

There is no secret that the complexity of vulnerability for cloud and application security is increasing consistently.

The speed at which modern organizations are building applications and security teams are catching up to them is increasing.

I recently talked at the open security summit about how much pressure is increasing. 

It comes as no shock that 54% of application security and cloud security professionals have considered changing jobs or industries in the last few years

(CxO online)

Increased Complexity in Application Security and Cloud security leads to more skill shortage.

Among those challenging times, there is a well-known acute cybersecurity shortage. On top of the shortage being in cloud security space and application security space. 

It is no surprise since those two spaces are probably more complex to grasp for newcomers. 

Effects of cybersecurity skills shortage worsening, new study says

Credit Tech Target, 

On the other hand, new vulnerabilities are getting published, and cloud and applications are increasing, with covid being the main driver of remote and digital assets. 

96% of leaders report Covid-19 will accelerate their digital transformation by an average of 5.3 years

63% of leaders state that the Covid-19 pandemic prompted them to embrace digital transformation sooner than originally planned

(IBM)(Celerity)

And the numbers of those are going to increase consistently due to the increased workload additional complexity.

Effects of cybersecurity skills shortage worsening, new study says

Credit Tech Target 

So what are the other factors of those shortages?

  • Increase the number of vulnerabilities
  • Increased complexity of applications and where they are deployed
  • Incident response techniques are still very much manual and focus on antiquated playbooks
  • Increased Complexity
  • Decreased time to release
  • New workforce and reshuffle 

We recently wrote a whitepaper that expands on this problem, following some considerations on the subject https://phoenix.security/whitepapers-resources/whitepaper-vulnerability-management-in-application-cloud-security/

Focus and balance on Vulnerabilities that matters most in Application Security and Cloud Security

What is the solution to all this? 

Focus and balance

Focus on what’s exploitable and risk-based prioritization of vulnerabilities are the key to partially addressing skill shortage and reducing burnout. Helping an organization’s security team to scale betters enables them to dedicate more time to better new security professionals, convert and upskill developers, and prevent burnout by triage.  

Ballance between what’s built and what’s fixed because fixing security issues at the end of a cycle requires 10X more effort than when new application security and cloud security vulnerabilities are discovered.

Context-based risk assessment – focusing on all the vulnerabilities published is simply impossible and not practical. 

A small number of Application security/ Infrastructure Security / Cloud Security vulnerabilities are exploitable
A small number of Application security/ Infrastructure Security / Cloud Security vulnerabilities are exploitable

70% of developers skip security steps because there are simply too many vulnerabilities to fix, and only 10-14% Percent of those vulnerabilities do need attention right away

Fixing a vulnerability that is potentially bad on an external website or any server linked to an externally facing server is much more critical than one fully internal and does not host critical data. 

Contextual Prioritization and Risk-based prioritization

Luckily there is a methodology that helps convey vulnerability “severity” in the contextual aspect 

Risk = Probability (Likelihood of exploitation, Locality)  * Severity * Impact 

Risk Based Application Security and Cloud Security Prioritization factors
Application Security and Cloud Security Prioritization

Contextual aspects are based on:

  • The severity of a vulnerability – how much a 3rd party vendor has declared that vulnerability to potentially be dangerous
  • Probability of exploitation – how likely is that vulnerability to be exploited
  • The locality is a factor in the probability of exploitation 
  • Impact (also known as a factor of the Business Impact Assessment) communicate how much damage a vulnerability could cause to the organisation

Risk-based threat assessment is usually done by security professionals. Still, this result in an overwhelming job as the factors that need to be considered is simply too many and vary too quickly. 

A topography of IT components in a typical enterprise with many vulnerabilities to consider in application security and cloud security

Following is a list of elements security professionals need to consider when triaging and deciding which vulnerabilities to fix first :

  • How an application is being built
  • Where it is deployed (which network, which environment) 
  • What kind of data does the application process
  • How many of the components are external, Internal or connected to those
  • What are the vulnerabilities of the code, libraries and API that the application is building
  • Where are the encryption keys stored? Are there any misconfigurations in the storage system 
  • Is any of the systems where the application is being deployed vulnerable or has it become vulnerable
  • Is any of the software in the system where the application is being deployed
  • Is there any threat actor group targeting a specific vulnerability/system
  • What is the blast radius if one of those components gets compromised

The complexity of this scenario increase when we consider the speed of deployment, where some of the environments get modified 100 times per day. Not all those deployments will lead to a potential compromise or misconfiguration, but some might. 

Risk cannot be completely avoided. Organisations need to choose where to apply efforts to reduce risk. Cybersecurity risk management (RM) helps enterprises decide what systems and information to prioritise or tolerate.

Polemon Institute application security professionals vs developers
Polemon Institute application security professionals vs developers

Security professionals can’t be scaled infinitely, and more developers are being produced than security researchers.

Scaling security in a traditional organization is challenging. It requires automation and selection of vulnerabilities and misconfiguration to fix application security and cloud security that matches the development team’s speed of deployment and growth.

A solution that triages automatically and proposes what to mitigate needs to consider

Probability of exploitation

  • The severity of a vulnerability (CVE, CWE, CVSS and CWSS)
  • The locality of an asset, also known as Context
  • Exploitability of a vulnerability based on the availability of Proof of concept or code snippet
  • Probability of an attacker targeting the vulnerability
  • Active exploitation of the vulnerability from threat actors groups 
  • Discussion on Twitter, Linkedin, Reddit and other forums
  • How recent is the vulnerability (in the first 40 days, vulnerabilities are exploited/targeted more frequently) 

Impact on system

  • What data
  • How many users
  • How much revenue could be impacted 
  • Contractual impact
  • Brand image damage 

We recently wrote a whitepaper  that expands on this problem https://phoenix.security/whitepapers-resources/whitepaper-vulnerability-management-in-application-cloud-security/ 

How to set targets

Service Level Objectives/Agreements are not a solution but an aid to setting targets for teams but can be an aid if there is nothing else.

Expanding on the subject here would be too extensive; we wrote several whitepapers and articles on the subject;

In conclusion, targets based on risk are much more precise and variable.

Additional Information is available in the article on SLA, SLA and OKR”

For more details on how to set metrics, there is another article that expands on the subject: https://phoenix.security/vulnerability-infrastructure-and-application-security-sla-slo-okr-do-they-matter/ 

We are publishing another whitepaper on SLA:
https://phoenix.security/whitepapers-resources/data-driven-vulnerability-managementre-sla-slo-dead/ 

Conclusion

Ultimately CVE and CVSS are a good starting point. Still, with only 10-14% being targeted at a particular time, the security and development teams need to focus on which is more likely to be exploited. 

Freeing security professionals from data analysis and triaging enables them to focus on skill training of the development team, triaging the most critical vulnerabilities. 

Security professionals can also spot interconnections between systems better than machines and correlate procedure violations.

Also, freer security professionals can propose mitigation strategies for vulnerabilities like compensating controls and upgrades of systems that normally no AI or tool would be able to determine. 

On the flip side, technology is now much more capable of correlating a high number of data sources at scales and AI models like decision trees, neural networks, and Random Forest classifiers. Most importantly, Elastic-net models trained with gradient boosting can quickly digest a lot of data. 

Prediction models based on technology like Phoenix Security can process trillions of data sources and dynamic context and convert them into risk. This frees security professionals and enables them to focus on the most important vulnerabilities.

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Explore the interplay between the MITRE ATT&CK framework and EPSS for effective vulnerability management. Learn how these tools help predict and prioritize cyber threats, with deep dives into the most and least exploited techniques. Stay ahead in cybersecurity with Phoenix’s advanced analysis.
Francesco Cipollone

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.