<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Sensible Security]]></title><description><![CDATA[Providing my personal perspective on information security. A perfect blend of expert insights and hot takes.]]></description><link>https://sensiblesecurity.xyz</link><image><url>https://sensiblesecurity.xyz/img/substack.png</url><title>Sensible Security</title><link>https://sensiblesecurity.xyz</link></image><generator>Substack</generator><lastBuildDate>Thu, 16 Apr 2026 14:38:38 GMT</lastBuildDate><atom:link href="https://sensiblesecurity.xyz/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Justin Pagano]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[sensiblesecurity@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[sensiblesecurity@substack.com]]></itunes:email><itunes:name><![CDATA[Justin Pagano]]></itunes:name></itunes:owner><itunes:author><![CDATA[Justin Pagano]]></itunes:author><googleplay:owner><![CDATA[sensiblesecurity@substack.com]]></googleplay:owner><googleplay:email><![CDATA[sensiblesecurity@substack.com]]></googleplay:email><googleplay:author><![CDATA[Justin Pagano]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[SOC 2 is dead, long live SOC 2!]]></title><description><![CDATA[With a healthy dose of in-depth continuous assurance]]></description><link>https://sensiblesecurity.xyz/p/soc-2-is-dead-long-live-soc-2</link><guid isPermaLink="false">https://sensiblesecurity.xyz/p/soc-2-is-dead-long-live-soc-2</guid><dc:creator><![CDATA[Justin Pagano]]></dc:creator><pubDate>Wed, 17 Sep 2025 15:31:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!SH2o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<pre><code>Originally posted on the GRC Engineering Community Blog <strong><a href="https://blog.grc.engineering/publish/post/173858943">here</a></strong></code></pre><blockquote><p><em><strong>In-depth continuous assurance</strong> over shallow periodic monitoring</em></p></blockquote><p>This is <a href="https://grc.engineering/#:~:text=In%2Ddepth%20continuous%20assurance%20over%20shallow%20periodic%20monitoring">core value #5 in the GRC Engineering Manifesto</a>. I've been thinking about it a lot lately, especially given all of the dunking on SOC 2 that has happened over the last year, such as all the problems with "<a href="https://www.linkedin.com/posts/ayoubfandi_if-your-customers-still-send-questionnaires-activity-7304842724686348288-ezes/?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAOWtFgB7KuqZ_QqyOQLCH_UnEtv4HD7Z2k">compliance commoditization</a>" and "<a href="https://www.linkedin.com/search/results/content/?keywords=%22SOC-in-a-box%22&amp;origin=FACETED_SEARCH&amp;sid=ep)&amp;sortBy=%22date_posted%22">SOC-in-a-box</a>" and<a href="https://www.anecdotes.ai/post/original-soc-2-sin"> who is to blame</a> for it all (Compliance Automation vendors? the AICPA? audit firms? third-party risk management teams? all of the above?!)</p><p>There&#8217;s a growing chorus of folks in our industry who claim that SOC 2, and the AICPA&#8217;s stewardship of it, is thoroughly busted. On the other hand, auditors and CPAs claim that low quality or incompetent auditors are the problem and SOC 2 itself is fundamentally sound.</p><p>In my mind, there are valid points on either side of this debate.</p><p>But I also think there are deeper issues with SOC 2 (and other security compliance frameworks) that haven't been discussed as much, let alone what it looks like for those issues to be resolved.</p><p>In this post, I&#8217;m going to lay out what I believe these deeper issues are, paired with a vision for what a better approach could look like for security compliance frameworks to finally provide <em>in-depth continuous assurance </em>about an organization&#8217;s security controls.</p><h1>The problem with SOC 2? It SOCs 2 much!</h1><p>My first premise on this topic is this: <strong>there has never been a time when SOC 2 - or really any industry standard &#8220;security compliance audit&#8221; - was ever good enough, in any way, shape, or form at providing sufficient assurance about an organization&#8217;s security controls.</strong></p><p>The fundamental issues with SOC 2&#8217;s assurance value predate &#8220;SOC-in-a-box&#8221; automation products. These issues have been present throughout SOC 2&#8217;s history: from SAS 70 being used before the cloud was The Cloud<sup>TM</sup> (RIP <a href="https://en.wikipedia.org/wiki/Application_service_provider">ASPs</a>); to SSAE 16 establishing SOC as the successor to SAS 70; to SSAE 18 replacing SSAE 16; and all the way up to the <a href="https://assets.ctfassets.net/rb9cdnjh59cm/5jT1narHNQNzt4JGlkd1gr/248661d08e42531329d147782a6f8854/Trust-services-criteria.pdf">2022 &#8220;Revised Points of Focus&#8221; update to the 2017 Trust Services Criteria</a>. SOC-in-a box compliance commoditization has merely made it easier to see the deep flaws with security compliance frameworks and audits of all kinds.</p><h1>The deeper issues with security compliance frameworks and audits</h1><p>Every security compliance framework shares the same fundamental ingredients:</p><ol><li><p>A set of <strong>requirements</strong> or <strong>objectives </strong>that controls must achieve</p></li><li><p>An <strong>audit methodology</strong> for determining how well controls meet said requirements</p></li><li><p>A <strong>reporting artifact</strong> to convey assurance signals to stakeholders via findings and opinions from the audit</p></li></ol><p>How these ingredients are implemented vary from framework to framework. But aside from maybe one framework, they all do a poor job at putting these ingredients together in ways that provide in-depth continuous assurance.</p><p>Let's unpack the common flaws with each of these one by one.</p><h2>Control requirements: vague solutions for unclear problems</h2><p>The biggest issue with how <strong>control requirements </strong>are implemented is that they are defined without any explicit association or relevance to the <em>threats</em> they are intended to guard against (with the exception of HITRUST - but even it suffers from deeper issues with the other two ingredients I described above).</p><p>In the case of SOC 2, control requirements in the form of Trust Services Criteria (TSC) and Additional Points of Focus (PoFs) are so vague that they are virtually useless for ensuring organizations consistently design controls that are proven to be effective at protecting against <em>relevant threats</em>.</p><p>Let&#8217;s use SOC 2&#8217;s Common Criteria (CC) 6.6 as an example:</p><ul><li><p>CC 6.6 TSC: &#8220;<em>The entity implements logical access security measures to protect against threats from sources outside its system boundaries</em>&#8221;</p></li><li><p>CC 6.6 PoF: &#8220;<em>Identification and authentication credentials are protected during transmission outside its system boundaries</em>&#8221;</p></li></ul><p>Imagine for a moment if this same kind of requirements framework were used for, let&#8217;s say, car safety. In such a bizarro world of vague, loose, and totally optional car safety requirements (which <a href="https://en.wikipedia.org/wiki/Automotive_safety#History">basically existed for ~100 years</a>), it would be like having a TSC stating &#8220;<em>the car implements physical restraint measures to protect passengers against threats from abrupt deceleration events</em>&#8221; and a PoF stating &#8220;<em>passengers are protected during high speed movements on roadways.</em>&#8221;</p><p>This clearly would be a virtually useless way to not only provide sufficient assurance about the safety of any given car, but to ensure that all cars are equipped with universally-applicable safety measures that protect against common threats that all passengers face.</p><p>This has certainly been the case for SOC 2 and other security compliance frameworks. They need to evolve their underlying controls requirements model to be focused on <strong>specific </strong>requirements that are known to be<strong> effective at protecting against common threats.</strong></p><h2><strong>Audit methodologies: 20th century approaches applied to 21st century systems</strong></h2><p>This is the area that SOC 2 and other security compliance audits get criticized about the most: point-in-time screenshots, hours upon hours of walkthrough meetings, and quarterly lookback reviews all make the audit world go &#8216;round.</p><p>While these tend to be the most frustrating and inefficient aspects of audits for those who undergo them, I find that these are not the most problematic aspects of how current audit methodologies severely limit the assurance value such audits can provide. The <strong>biggest</strong> shortcoming with our security compliance audit methodologies is that we almost never assess <em>historical</em> evidence for technical controls&#8217; operating effectiveness. This can result in huge misses about the reality of an organization&#8217;s&#8217; control operating effectiveness which is best summed up with this meme:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PKBS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PKBS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png 424w, https://substackcdn.com/image/fetch/$s_!PKBS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png 848w, https://substackcdn.com/image/fetch/$s_!PKBS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png 1272w, https://substackcdn.com/image/fetch/$s_!PKBS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PKBS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png" width="604" height="800.4623655913979" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:986,&quot;width&quot;:744,&quot;resizeWidth&quot;:604,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!PKBS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png 424w, https://substackcdn.com/image/fetch/$s_!PKBS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png 848w, https://substackcdn.com/image/fetch/$s_!PKBS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png 1272w, https://substackcdn.com/image/fetch/$s_!PKBS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fea548ce1-9714-49af-b6bb-7a7053bb16ef_744x986.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Not only that, but auditors still primarily use evidence sampling methods (both statistical and nonstatistical) to draw conclusions about control operating effectiveness. However, there have been <a href="https://www.cpajournal.com/2016/02/13/unsolved-problems-auditing-half-century-retrospective-update/#:~:text=Jacoby%20and%20Hitzig,theory%20or%20fact%E2%80%9D">long-running concerns</a> within the accounting profession with how auditors exercise too much professional judgment, rather than more strictly sticking to rigorous statistical principles, when determining what kinds of sampling methods to use and how to apply them. This can create excessive risks with drawing inaccurate conclusions about control operating effectiveness.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!SH2o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!SH2o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png 424w, https://substackcdn.com/image/fetch/$s_!SH2o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png 848w, https://substackcdn.com/image/fetch/$s_!SH2o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png 1272w, https://substackcdn.com/image/fetch/$s_!SH2o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!SH2o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png" width="466" height="470.1981981981982" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:672,&quot;width&quot;:666,&quot;resizeWidth&quot;:466,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!SH2o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png 424w, https://substackcdn.com/image/fetch/$s_!SH2o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png 848w, https://substackcdn.com/image/fetch/$s_!SH2o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png 1272w, https://substackcdn.com/image/fetch/$s_!SH2o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe17be639-3bc5-4cd2-9443-3e641cc41e8b_666x672.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>What comes to mind every time I read an unqualified opinion for a SOC 2 report containing multiple exceptions against small sample sizes for multiple controls</em></figcaption></figure></div><p>Now you might be thinking, &#8220;wait, my auditors <em>always </em>ask for samples of control evidence that include past dates during my audit period!&#8221; - and to that I would say: yes, you&#8217;re correct!</p><p>But this usually is only done for <strong>process</strong> controls that are inherently transactional in nature. For example: access requests, access (de)provisioning events, change requests, etc. which are operated via ticketing systems which necessarily means there is always historical evidence of a control&#8217;s operations.</p><p>However, <strong>technical</strong> controls that are inherently stateful in nature, such as at-rest data encryption, endpoint detection &amp; response (EDR) tooling, or web application firewalls (WAFs), are only assessed by auditors for their <strong>current</strong> state. It doesn&#8217;t matter how long your audit period is - it could be 1 month, 6 months, or 12 months - your technical controls&#8217; operating effectiveness is <strong>not</strong> being properly tested.</p><p>Why might this be? Well, a lot of organizations likely aren&#8217;t maintaining a historical audit trail of their technical controls&#8217; state over time, and for whatever reason most auditors don&#8217;t think to push their clients to provide such historical evidence, even as an opportunity for improvement to implement before the next audit happens.</p><p>We need to change our audit methodologies to fully cover <strong>historical </strong>control operating effectiveness during the entirety of an audit period and to analyze the<strong> full population</strong> of a control, especially for technical controls. Otherwise, we&#8217;re only providing (very weak) assurance about controls&#8217; operating effectiveness for the brief moment in time we gather evidence about their state.</p><h2><strong>Reporting artifacts: static documents for providing assurance about dynamic environments</strong></h2><p>Take a look at the results from this very unscientific <a href="https://www.linkedin.com/posts/activity-7303593161845555201-Uk1l?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAOWtFgB7KuqZ_QqyOQLCH_UnEtv4HD7Z2k">poll </a>I conducted on LinkedIn to gauge what our profession thinks the &#8220;use by&#8221; date for your SOC 2 Type II report should be before its assurance value expires. The results are fascinating:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pfYZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pfYZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png 424w, https://substackcdn.com/image/fetch/$s_!pfYZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png 848w, https://substackcdn.com/image/fetch/$s_!pfYZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png 1272w, https://substackcdn.com/image/fetch/$s_!pfYZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pfYZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png" width="520" height="396.6511627906977" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:984,&quot;width&quot;:1290,&quot;resizeWidth&quot;:520,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!pfYZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png 424w, https://substackcdn.com/image/fetch/$s_!pfYZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png 848w, https://substackcdn.com/image/fetch/$s_!pfYZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png 1272w, https://substackcdn.com/image/fetch/$s_!pfYZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F315a720b-ca6c-4b2f-a4ad-76c340bddde7_1290x984.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>It&#8217;s shocking that anyone thinks that a SOC 2 Type II report provides sufficient assurance up to 12 months after it is issued. Modern software-as-a-service organizations are making dozens, hundreds, and even thousands of changes to their systems every day. Every change poses varying risk to the operating effectiveness of the controls that exist in and around said systems: entire workloads deployed without threat detection controls in place (ouch!), new data stores deployed without at-rest encryption enabled (oops!), or a new web API released on a domain that your WAF isn&#8217;t configured to protect (oof!).</p><p>Now let&#8217;s take into account the fact that it can take <em>weeks </em>to go from the last piece of evidence being reviewed by your external auditor and your SOC 2 Type II report being finalized. Why do we treat this status quo of security compliance reporting artifacts as having <em>any</em> assurance value more than 1 week after they&#8217;ve been finalized?</p><p>We need a <strong>new kind of reporting artifact that is dynamic enough</strong> to reflect the current, and historical, operating effectiveness of an organization's controls. Static PDFs aren&#8217;t gonna cut it anymore.</p><h1><strong>A vision for security compliance audits that provide true in-depth continuous assurance</strong></h1><p>The problems with our current security compliance audit frameworks are clear: control requirements are very vague and not explicitly threat informed, audit methodologies are way too narrowly focused, and static reporting artifacts quickly become outdated views of highly dynamic control environments.</p><p>To overcome these fundamental flaws with SOC 2 and other security compliance frameworks, I&#8217;d like to propose a new framework for providing in-depth continuous assurance about an organization&#8217;s controls viability and operating effectiveness.</p><p>This framework:</p><ol><li><p>Should have specific control requirements that are explicitly related to relevant threats</p></li><li><p>Should facilitate and require comprehensive control auditing methodologies that match the scale and depth of modern organizations&#8217; control environments</p></li><li><p>Should provide a reporting artifact that is as dynamic as the control environments for which it is intended to describe the operating effectiveness</p></li></ol><p>I call this framework ALCOVE: <strong>A</strong>ssurance <strong>L</strong>evels for <strong>C</strong>ontrol <strong>O</strong>perating <strong>V</strong>iability &amp; <strong>E</strong>ffectiveness.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ICrB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ICrB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png 424w, https://substackcdn.com/image/fetch/$s_!ICrB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png 848w, https://substackcdn.com/image/fetch/$s_!ICrB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png 1272w, https://substackcdn.com/image/fetch/$s_!ICrB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ICrB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png" width="1456" height="341" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:341,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!ICrB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png 424w, https://substackcdn.com/image/fetch/$s_!ICrB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png 848w, https://substackcdn.com/image/fetch/$s_!ICrB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png 1272w, https://substackcdn.com/image/fetch/$s_!ICrB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7cee000-7c8c-4247-bac9-c851f5bbe1e7_2048x480.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Rather than totally reinventing the wheel, I believe we should draw inspiration from wheels that have already been invented from similar disciplines within security and software engineering. There already exists a scalable and robust security assurance framework that is being adopted by software providers, large and small, across various industries: Supply-chain Levels for Software Artifacts, or <a href="https://slsa.dev/">SLSA </a>("salsa") for short, which is a software supply chain security assurance framework.</p><p>Similar to SLSA, ALCOVE has various <strong>levels</strong> of assurance that an organization can strive to provide, allowing for flexibility for organizations and their stakeholders alike to provide and require establishing certain levels of assurance based on their specific needs.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!J81k!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!J81k!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png 424w, https://substackcdn.com/image/fetch/$s_!J81k!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png 848w, https://substackcdn.com/image/fetch/$s_!J81k!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png 1272w, https://substackcdn.com/image/fetch/$s_!J81k!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!J81k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png" width="1456" height="696" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/fe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:696,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!J81k!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png 424w, https://substackcdn.com/image/fetch/$s_!J81k!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png 848w, https://substackcdn.com/image/fetch/$s_!J81k!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png 1272w, https://substackcdn.com/image/fetch/$s_!J81k!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ffe7cf782-7390-403f-ae6b-7fa8050a63b6_2048x979.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Here&#8217;s what it could look like to integrate ALCOVE with SOC 2:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2tgM!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2tgM!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png 424w, https://substackcdn.com/image/fetch/$s_!2tgM!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png 848w, https://substackcdn.com/image/fetch/$s_!2tgM!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png 1272w, https://substackcdn.com/image/fetch/$s_!2tgM!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2tgM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png" width="1456" height="663" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:663,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!2tgM!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png 424w, https://substackcdn.com/image/fetch/$s_!2tgM!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png 848w, https://substackcdn.com/image/fetch/$s_!2tgM!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png 1272w, https://substackcdn.com/image/fetch/$s_!2tgM!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc9567b60-fb06-4484-9b37-7662dd83c206_2048x932.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>SOC 2 Type I and Type II reports would still exist in this world and still provide (limited) value for organizations and their stakeholders. However, we can extend SOC 2 report types to Type III and Type IV so SOC 2 can provide higher levels of assurance in line with ALCOVE Level 3 and Level 4.</p><p>In order for this to truly overcome the three fundamental flaws I outlined above, we need to also evolve our control requirements and reporting artifacts.</p><p>In the world of ALCOVE, SOC 2&#8217;s TSCs would be more rigorous, incorporating Common Threat Criteria and Common Mitigation Criteria to ensure organizations are implementing relevant controls that are well known to protect against relevant threats <em>so that sufficient assurance can be clearly and unambiguously provided about control operating effectiveness. </em>Here&#8217;s an example of what that could look like - the text in black below is existing text from SOC 2&#8217;s TSC language, and the text in red are the additional ALCOVE-related control requirements:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!TmQc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!TmQc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png 424w, https://substackcdn.com/image/fetch/$s_!TmQc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png 848w, https://substackcdn.com/image/fetch/$s_!TmQc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png 1272w, https://substackcdn.com/image/fetch/$s_!TmQc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!TmQc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png" width="1456" height="808" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:808,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!TmQc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png 424w, https://substackcdn.com/image/fetch/$s_!TmQc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png 848w, https://substackcdn.com/image/fetch/$s_!TmQc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png 1272w, https://substackcdn.com/image/fetch/$s_!TmQc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc8a5193e-db83-4354-b4e2-3242785bff13_2048x1136.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Finally, we need to revamp our security compliance reporting artifacts so they&#8217;re as dynamic as the control environments we&#8217;re trying to provide in-depth continuous assurance around. In addition to providing an audit report, with rich context about an organization&#8217;s system, architecture, controls, and an auditor&#8217;s opinion about control operating effectiveness, we also need control operating effectiveness metrics that capture current and historical operating effectiveness. Much in the same way that <a href="https://www.atlassian.com/software/statuspage">StatusPage </a>created a new paradigm for providing transparency around an organization&#8217;s system uptime and availability, an ALCOVE-specific reporting artifact would look something like this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!b1oN!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!b1oN!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png 424w, https://substackcdn.com/image/fetch/$s_!b1oN!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png 848w, https://substackcdn.com/image/fetch/$s_!b1oN!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png 1272w, https://substackcdn.com/image/fetch/$s_!b1oN!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!b1oN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png" width="1456" height="661" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:661,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!b1oN!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png 424w, https://substackcdn.com/image/fetch/$s_!b1oN!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png 848w, https://substackcdn.com/image/fetch/$s_!b1oN!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png 1272w, https://substackcdn.com/image/fetch/$s_!b1oN!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F48069d6a-6207-480f-85bd-f77514e1398a_2048x930.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While existing Trust Center products on the market today provide Key Control Indicator (KCI) metrics about an organization&#8217;s controls, they are, quite frankly, junk. They only tell you what the &#8220;current state&#8221; of an organization&#8217;s controls are like. And in some cases, certain Trust Center products will <strong>hide/remove</strong> a control (and its corresponding green checkmark) when the control is in a <strong>failing state</strong>. This is pure unadulterated security assurance theater. In order for real-time control operating effectiveness dashboards to truly provide in-depth continuous assurance, they must provide an honest representation of an organization&#8217;s controls, both current and historical states.</p><p>As excited as I am about how a framework like ALCOVE could help provide stronger assurance about control operating effectiveness, there is a big obstacle to adopting a more rigorous approach like it: <strong>incentives</strong>.</p><h1><strong>Overcoming the obstacle of misaligned incentives</strong></h1><p>Right now, incentives around security compliance audits are skewed in the wrong direction: many organizations, especially smaller and newer companies, are incentivized to pursue cheaper and weaker audits that don&#8217;t sufficiently scrutinize their controls. This distorts market signals about organizations&#8217; risk profiles, especially when third-party due diligence teams rely on basic compliance requirements to &#8220;allow&#8221; vendors into their environment (&#8220;Do you have a SOC 2 Type II without a qualified opinion or any exceptions? Ok, great, now answer these 500 other questions about your security practices - be honest! If your answers look good enough, you&#8217;ll win our $200k ARR contract.&#8221; Let&#8217;s not kid ourselves: these incentives are so horribly misaligned.)</p><p>Additionally, third party security risk management teams aren&#8217;t usually empowered to make risk-taking decisions for other stakeholders at their organization, who are looking to use a vendor solution due to the outsized value they stand to gain from doing so. Third party security risk assessments are typically highly inefficient and take too much time to get to a decision about whether or not to proceed with a vendor given their risk profile. Teams that take weeks to assess a vendor that they would then want to say &#8220;no&#8221; to because of weak security controls will get bulldozed over by leaders at their organization. In so doing, they will burn through political capital, undermining trust in their team and function across their organization which can create feelings of job insecurity. In other words: third party security risk management teams have neither the leverage nor incentive to say &#8220;no&#8221; to a vendor that provides weak assurance about their security controls.</p><p>One way we could course correct incentives in this dynamic? By better integrating cyber insurance into the mix!</p><p>Here&#8217;s what the current state of our &#8220;security assurance &amp; insurance&#8221; dynamic looks like in the world:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yiSW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yiSW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png 424w, https://substackcdn.com/image/fetch/$s_!yiSW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png 848w, https://substackcdn.com/image/fetch/$s_!yiSW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png 1272w, https://substackcdn.com/image/fetch/$s_!yiSW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yiSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png" width="1456" height="737" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:737,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!yiSW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png 424w, https://substackcdn.com/image/fetch/$s_!yiSW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png 848w, https://substackcdn.com/image/fetch/$s_!yiSW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png 1272w, https://substackcdn.com/image/fetch/$s_!yiSW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6a4d6f50-0873-472e-8876-c12234f1d0c6_2048x1036.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The incentives that exist in this dynamic are as follows:</p><ul><li><p><strong>Auditors</strong> want to grow their customer base and make more money, meaning they want to avoid upsetting their customers with lengthy cumbersome audits that could result in them getting a &#8220;failing grade.&#8221;</p></li><li><p><strong>Customers are of two minds: </strong>the <em>actual</em> customer team for a vendor&#8217;s solution wants to get their hands on said solution ASAP. Third-party risk management teams are encumbered by contradictory fears: the fear of approving an overly-risky vendor (which if said vendor experiences a security incident, third-party risk management teams fear <em>they</em> will be held accountable for making a bad risk decision); and the fear of saying &#8220;no&#8221; resulting in backlash from the customer team.</p></li><li><p><strong>Vendors </strong>want fast, easy, and cheap audits so they can win more business and keep their sales cycle running efficiently.</p></li><li><p><strong>Insurance providers </strong>want to grow their customer base and make more money while reducing uncertainty about the risk pool they&#8217;re managing, such that they reduce the likelihood and size of claim payouts.</p></li></ul><p>At the end of the day, all players are motivated by two fundamental incentives: <strong>spend less resources to get more value.</strong></p><p>So what would a better model look like where incentives are better aligned in a way that actually could drive improved controls across organizations through stronger assurance signals being provided by vendors to other stakeholders?</p><p>I am going to draw inspiration for this idea from two sources: the <a href="https://aiuc.com/">Artificial Intelligence Underwriting Company</a>, which is pioneering a novel AI Assurance + Insurance framework called <a href="https://aiuc-1.com/">AIUC-1</a> (which, you may notice, is very ALCOVE-esque); and <a href="https://www.progressive.com/auto/discounts/snapshot/">Progressive Insurance&#8217;s Snapshot</a> offering, which allows drivers to get discounts on their car insurance while allowing Progressive to reduce uncertainty about their risk pool via automated continuous monitoring of driving behavior.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!A6-S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!A6-S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png 424w, https://substackcdn.com/image/fetch/$s_!A6-S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png 848w, https://substackcdn.com/image/fetch/$s_!A6-S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!A6-S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!A6-S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png" width="1456" height="771" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:771,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!A6-S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png 424w, https://substackcdn.com/image/fetch/$s_!A6-S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png 848w, https://substackcdn.com/image/fetch/$s_!A6-S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png 1272w, https://substackcdn.com/image/fetch/$s_!A6-S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa82be348-57ed-4fd6-b5a5-725f6af12c06_2048x1084.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Now the incentives change, driven largely by insurance providers who have the most leverage of any other stakeholder in this picture. All organizations currently have a strong incentive to transfer cyber risk to insurance providers in order to avoid experiencing catastrophic losses (for example, through extensive outages and system disruptions caused by ransomware).</p><p><strong>Insurance providers</strong> have a great opportunity to push vendors to automatically and continuously feed them evidence about their controls, instead of gathering context via questionnaires once per year.</p><p><strong>Vendors</strong> stand to save money on their cyber insurance premiums with the same, or potentially better, coverage, which of course requires them to ensure their controls are continuously operating effectively!</p><p><strong>Auditors</strong> stand to have an easier time performing faster, more efficient <strong>and </strong>more rigorous audits.</p><p><strong>Customers</strong> stand to gain stronger assurance, at the time they perform due diligence <strong>and</strong> continuously thereafter.</p><p>Did I just solve all of the world&#8217;s cybersecurity problems???</p><p>(I kid, I kid)</p><h1><strong>In conclusion</strong></h1><p>All of this is very much wishful thinking on my end. But we as a civilization have achieved crazier things in less opportune circumstances (see: sending humans to the Moon and back in a fancy metal pressurized can using 1960s-era technology).</p><p>What do you think of this? What seems like it would work or not work about these ideas? What would make it more viable?</p>]]></content:encoded></item><item><title><![CDATA[Apple PCC is the future of consumer cloud computing we all deserve]]></title><description><![CDATA[Microsoft, Google, and literally everyone else need to get their act together]]></description><link>https://sensiblesecurity.xyz/p/apple-pcc-is-the-future-of-cloud</link><guid isPermaLink="false">https://sensiblesecurity.xyz/p/apple-pcc-is-the-future-of-cloud</guid><dc:creator><![CDATA[Justin Pagano]]></dc:creator><pubDate>Thu, 20 Jun 2024 11:08:35 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dYDQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Apple seems to be the only massive corporation that gives a sh!rt about customers&#8217; data privacy and security. They care about it so much that they continue to painstakingly go out of their way to prove how much they care about it. </p><p>Last week, during WWDC 2024, they announced <a href="https://www.apple.com/apple-intelligence/">Apple Intelligence</a> and <a href="https://security.apple.com/blog/private-cloud-compute/">Private Cloud Compute</a> (PCC). They spent a surprising amount of time boasting about how they architected a secure-by-design (SbD) and private-by-design (PbD) cloud computing architecture for Apple Intelligence. In doing so, they&#8217;ve continued to deservingly earn their customers&#8217; trust and the right to <a href="https://www.windowscentral.com/software-apps/windows-11/listen-to-apples-mocking-response-to-microsofts-spectacular-windows-recall-ai-failure">dunk on their competition</a> for failing to walk the same <a href="https://www.microsoft.com/en-us/security/blog/2024/05/03/security-above-all-else-expanding-microsofts-secure-future-initiative/">talk</a>.</p><p>Their <a href="https://security.apple.com/blog/private-cloud-compute/">security blog post about PCC</a> provides compelling details about how Apple has incorporated SbD and PbD features into PCC&#8217;s architecture. </p><p>I have a strong predisposition toward visual thinking and learning, especially when it comes to abstract information systems and security concepts. I took a stab at visualizing the security and privacy architecture features of Apple&#8217;s Private Cloud Compute as a way to make it easier for myself to wrap my head around their written description of PCC and also to validate and demonstrate the rigor of their approach.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dYDQ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dYDQ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!dYDQ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!dYDQ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!dYDQ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dYDQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:533774,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dYDQ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!dYDQ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!dYDQ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!dYDQ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7eb0456-2f85-477d-b7dc-d92978658451_2560x1440.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Apple PCC&#8217;s Supply Chain Security Architecture</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!p0q7!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!p0q7!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!p0q7!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!p0q7!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!p0q7!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!p0q7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:502852,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!p0q7!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!p0q7!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!p0q7!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!p0q7!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea0cf2f-a391-435f-ba2c-644fe1285252_2560x1440.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Apple&#8217;s PCC Runtime Security Architecture</figcaption></figure></div><p>At the end of the day, the ingredients in Apple&#8217;s PCC architecture that matters more than all the others are:</p><ol><li><p>The cryptographically tamper-proof append-only PCC build transparency log</p></li><li><p>Publicly accessible and reviewable PCC build images</p></li><li><p>Tools for analyzing PCC build images</p></li></ol><p>The fact that Apple is going out of their way to allow public security and privacy researchers to easily analyze, and cryptographically authenticate, their PCC builds is almost unheard of in the industry.</p><p>Apple is basically saying <em>they</em> trust that no one will trust their word alone, and in order to properly provide assurance around the security and privacy &#8220;promises&#8221; they&#8217;re making, they have to be radically and robustly transparent about their new cloud-based AI features.</p><p>Admittedly, I might be a bit overly excited and not skeptical enough about what Apple has done here. </p><p>So I&#8217;m curious:</p><ul><li><p>What do you make of Apple&#8217;s PCC architecture? </p></li><li><p>What do you find impressive about it? </p></li><li><p>Where do you see it lacking in crucial SbD and PbD features? </p></li><li><p>What other residual risks and concerns do they still need to address?</p></li></ul>]]></content:encoded></item><item><title><![CDATA[Are we doing vulnerability management all wrong? Part 2.1: evolving beyond CVEs and the NVD]]></title><description><![CDATA[While working on part 3 of this series (title TBD), something strange happened in the world of vulnerability management: NIST&#8217;s NVD quietly posted a vague notice on their website about &#8220;delays in analysis efforts&#8221; due to time they&#8217;re spending establishing a &#8220;consortium to address challenges in the NVD program.&#8221; If you want to learn more about what is going on here, check out]]></description><link>https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management-941</link><guid isPermaLink="false">https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management-941</guid><dc:creator><![CDATA[Justin Pagano]]></dc:creator><pubDate>Tue, 12 Mar 2024 11:29:58 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Tzo_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Tzo_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Tzo_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png 424w, https://substackcdn.com/image/fetch/$s_!Tzo_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png 848w, https://substackcdn.com/image/fetch/$s_!Tzo_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png 1272w, https://substackcdn.com/image/fetch/$s_!Tzo_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Tzo_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png" width="1456" height="651" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:651,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Tzo_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png 424w, https://substackcdn.com/image/fetch/$s_!Tzo_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png 848w, https://substackcdn.com/image/fetch/$s_!Tzo_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png 1272w, https://substackcdn.com/image/fetch/$s_!Tzo_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe3bd9940-0860-458a-86e9-3c930e25a1e2_1486x664.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>While working on part 3 of this series (title TBD), something strange happened in the world of vulnerability management: NIST&#8217;s NVD quietly posted a vague notice on their website about &#8220;delays in analysis efforts&#8221; due to time they&#8217;re spending establishing a &#8220;consortium to address challenges in the NVD program.&#8221; If you want to learn more about what is going on here, check out <span class="mention-wrap" data-attrs="{&quot;name&quot;:&quot;Chris Hughes&quot;,&quot;id&quot;:106921976,&quot;type&quot;:&quot;user&quot;,&quot;url&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a6e409c2-2aa2-4d46-b20b-225e3a9b62d0_2500x1875.jpeg&quot;,&quot;uuid&quot;:&quot;ef1c4e80-8dd4-4dac-b929-a4e8255e2aae&quot;}" data-component-name="MentionToDOM"></span>&#8217;s <a href="https://resilientcyber.substack.com/p/death-knell-of-the-nvd">really solid overview</a> of the whole situation, including NVD outsiders&#8217; research and observations that shine a light on the kinds of &#8220;challenges&#8221; the NVD is facing.</p><p>In this interim part 2.1 article, I&#8217;m going to explore an idea I started discussing in Dan Lorenc&#8217;s LinkedIn <a href="https://www.linkedin.com/posts/danlorenc_nvd-nist-fedramp-activity-7172709591091245057-x0Ip?utm_source=share&amp;utm_medium=member_desktop">post</a> on this subject: that the NVD&#8217;s recent service degradation <a href="https://www.linkedin.com/feed/update/urn:li:activity:7172709591091245057?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A7172709591091245057%2C7172724205283708928%29&amp;dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287172724205283708928%2Curn%3Ali%3Aactivity%3A7172709591091245057%29">might be a blessing in disguise</a>, an opportunity for the InfoSec community to take a step back and seriously ask ourselves &#8220;is this <em>really</em> the best we can do with vulnerability management? What could or <em>should</em>&nbsp; &#8216;better&#8217; or &#8216;best&#8217; look like for vulnerability management?&#8221;</p><p>Let&#8217;s dive in to see what we can make of this!</p><h1><strong>Current vs. future state of our vulnerability management ecosystem</strong></h1><p>The world and practice of vulnerability management is incredibly, and almost exclusively, CVE centric. While alternative vulnerability databases exist, like GitHub Security Advisories (GHSA), Snyk&#8217;s SNYK vulnerability database, and the Open Source Vulnerabilities (OSV) project, they merely complement (and synchronize CVE data from) NIST&#8217;s NVD. All of our vulnerability management tools, &#8220;best&#8221; practices, frameworks, etc. are built on the foundation the NVD provides.</p><p>I&#8217;m a very visual thinker and find it really helpful to draw out really complex ideas and concepts to better demonstrate and capture what they&#8217;re all about. To that end, I took a stab at drawing out what I see as the <em>key</em> or <em>notable</em> ingredients that constitute our <strong>CVE-centric vulnerability management ecosystem</strong>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bP99!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bP99!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!bP99!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!bP99!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!bP99!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bP99!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/69c95893-4d75-427e-8602-a7fecf108584_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bP99!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!bP99!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!bP99!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!bP99!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F69c95893-4d75-427e-8602-a7fecf108584_1600x900.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Geez, I may as well have drawn out the digital equivalent of a rat&#8217;s nest, yeah? What an absolutely overcomplicated mess this is! Forget risk-based vulnerability management (RBVM) - with this many moving parts, we should call it &#8220;Rube Goldberg Vulnerability Management&#8221; (RGVM).&nbsp;</p><p>&#129345;</p><p><em>*insert laugh track</em>*</p><p>We have the CVE Organization - now independent of, but still highly reliant on, MITRE - as well as FIRST and NIST&#8217;s NVD basically propping the entire thing up. We&#8217;ve got at least three, if not four, distinct types of tools that are used to drive remediation of vulnerabilities: vulnerability scanners, ticketing systems, SOAR or other security automation tools, and patch management tools.</p><p>I <em>loathe</em> this, if you couldn&#8217;t already tell. This is an absurdly complex and inefficient system for a practice of information security that strives to &#8220;find and fix vulnerabilities before attackers exploit them.&#8221; No <em>wonder</em> attackers are mopping the floor with us, week in and week out. We can&#8217;t get out of our own way!</p><p>So, what might it look like if we instead reimagined this to be a <strong>patch-centric vulnerability management ecosystem</strong>, one that strives to &#8220;keep software current with the latest security patches&#8221; <em>as the primary means</em> to fix vulnerabilities before attackers exploit them?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j4e1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j4e1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!j4e1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!j4e1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!j4e1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j4e1!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j4e1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!j4e1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!j4e1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!j4e1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F339a1ee9-1456-4025-8208-4411cef24bc8_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Look closely at this and think about it for a few minutes.&nbsp;</p><p>Why <em>wouldn&#8217;t</em> this work?&nbsp;</p><p>Why wouldn&#8217;t this work as well as our current CVE-centric model?&nbsp;</p><p>Try to envision asset owners leveraging a predictable, structured, and rigorous approach to proactively applying patches using tools like <a href="https://www.vicarius.io/">Vicarius</a> (or even free tools like <a href="https://github.com/robjschroeder/App-Auto-Patch">App Auto-Patch</a>) for Windows, macOS, and Linux systems, or <a href="https://www.seal.security/">Seal Security</a> for precise security patch updates for third-party libraries, or <a href="https://www.moderne.io/">Moderne</a> for high-confidence code refactoring workflows to speed up MTTR for third-party library and framework updates, or <a href="https://www.chainguard.dev/">Chainguard</a> for already-fully-patched-for-you container images.</p><p>MacAdmins has already brought the idea of a <em><strong>patch-centric</strong></em> data feed to life with their <a href="https://sofa.macadmins.io">SOFA project</a>. </p><p>Try to envision how rigorous patch testing and quality assurance practices (drawing inspiration from modern software engineering CI practices especially) could allow us to patch proactively without needing to pick and choose patches based on complex risk-based triage logic and statistical prediction models (as cool as those are!). I&#8217;m talking about practices like <a href="https://en.wikipedia.org/wiki/Regression_testing">regression testing</a> and <a href="https://www.techtarget.com/whatis/definition/canary-canary-testing">canaries</a> rooted in strong observability and &#8220;failed patch&#8221; alerting logic.&nbsp;</p><p>Additionally, there are newer tools like <a href="https://trackd.com/">trackd</a> that provide historical patch quality analysis that make it easier to understand which patches <em>are</em> going to cause problems that you should <em>exclude</em> from your proactive patching cycle until you&#8217;ve had time to test them more rigorously yourself. Rather than picking and choosing which patches to deploy, tools like trackd allow you to pick and choose which patches to <em>exclude</em>.</p><p>I recently started referring to this overarching approach to rigorous patch testing and QA practices as <em>Fearless Patch Management<sup>TM</sup></em> (Gartner, you need to make this a thing!!!) because that&#8217;s what we should be talking about as the solution to the long-running and pervasive culture of &#8220;fear&#8221; about patches breaking things, with this fear being used as an excuse to only selectively patch vulnerabilities that defenders <em>think</em> attackers are going to exploit.</p><p>&#8230;</p><p>If this <em>still</em> doesn&#8217;t make sense as a better alternative to a CVE-centric vulnerability management ecosystem, what different ideas can <em>you</em> imagine that would allow organizations to much more efficiently, effectively, and <em>confidently</em> apply security patches on a continuous basis?</p><p>What would we need to do differently, or what tools would we need to build, or what new best practices would we need to invent, to make this <em>the</em> ecosystem that makes the vulnerability management world go round?</p><p>I&#8217;d love to get a discussion going around what a better future state of vulnerability management looks like that leans far more heavily into proactively fixing vulnerabilities - or installing security patches - and leans far away from reactively fixing only a tiny subset of vulnerabilities based on increasingly-complicated, nuanced, and presumptuous triage logic.</p><h1><strong>A quick side note about software supply chain vulnerability management concerns</strong></h1><p>What if the NVD actually <em>did</em> fizzle out or become obsolete due to concerns around the quality of their data and their ability to maintain it?</p><p>What would an NVD-less world of vulnerability databases look like? And how would this impact software supply chain security practices?</p><p>Well, I&#8217;ve got a picture for that!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pidc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pidc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!pidc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!pidc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!pidc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pidc!,w_2400,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png" width="1200" height="675" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a663210-d940-4a49-aad1-2119cad76880_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-large" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pidc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!pidc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!pidc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!pidc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a663210-d940-4a49-aad1-2119cad76880_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Makes sense, right? In this context, SBOMs (and supporting data provided by VDR and VEX files) play an integral part in supporting a decentralized vulnerability database ecosystem.&nbsp;</p><p>This would be more complex for sure and would require more intentional cooperation and partnership between vulnerability database providers to ensure consistent and high-quality data. Some sort of data synchronization and federation model could make this work at scale.</p><p>It would remove our reliance on a single centralized highly-bureaucratic source for vulnerability data. But maybe it could work?&nbsp;</p><h1><strong>Concluding thoughts</strong></h1><p>I don&#8217;t doubt that NVD will bounce back thanks to a consortium being formed that will allow it to operate more effectively and keep pace with an ever-growing list of newly published CVEs. However, this latest industry issue is as good an opportunity as ever for our profession to take a step back and seriously try to figure out what a better approach to vulnerability management can and <em>should</em> look like.</p><p>The sooner we figure that out, the sooner we can bring it to life.</p><p>Let&#8217;s go!</p>]]></content:encoded></item><item><title><![CDATA[Are we doing vulnerability management all wrong? Part 2: a better approach (maybe)]]></title><description><![CDATA[Update: part 2.1 is out in response to the NVD&#8217;s February 2024 service degradation announcement.]]></description><link>https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management-034</link><guid isPermaLink="false">https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management-034</guid><dc:creator><![CDATA[Justin Pagano]]></dc:creator><pubDate>Thu, 15 Feb 2024 18:17:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!UfFU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p><em><strong>Update</strong>: <a href="https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management-941">part 2.1</a> is out in response to the NVD&#8217;s February 2024 service degradation announcement.</em></p></blockquote><p>In <a href="https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management">part 1</a> of this article series, I opined on how vulnerability management programs tend to be heavily focused on <em>reactive</em> strategies with minimal focus on <em>proactive</em> ones. I proposed an opinionated proactive strategy that I dubbed <em>Proactive Vulnerability Patch Management </em>(PVPM). I even attempted to propose a risk-based prioritization framework to establish how an organization might start ramping up with PVPM, which I shamelessly dubbed <em>Stakeholder-Specific Patching Prioritization </em>(SSPP).&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!UfFU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!UfFU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!UfFU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!UfFU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!UfFU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!UfFU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:238949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!UfFU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!UfFU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!UfFU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!UfFU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F04d2aad7-2c52-46f0-b3d3-4db6decd2e34_2560x1440.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">PVPM in a nutshell</figcaption></figure></div><p>I can only imagine how giddy with excitement Gartner must be with these new ready-to-go cybersecurity marketing acronyms. But what really matters is what InfoSec practitioners make of these ideas, and make of these ideas they did! Below is a sampling of the feedback I got from my fellow InfoSec-ers that resonated with me the most:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sensiblesecurity.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Sensible Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><blockquote><p><em>Is it considered reactive to fix issues before they are exploited? How do you suppose this gets more proactive? Fixing issues before they arise? Yes. This is security by design. <strong>But that's a different domain and different department</strong>. Vulnerability management is supposed to identify issues and <strong>get them fixed before they are exploited</strong>.</em></p></blockquote><blockquote><p><em>One thing your blog post is missing that I'm excited about is <strong>secure-by-default</strong>. It's *so* much easier when developers are empowered to get the secure configuration from minute zero easily.</em></p></blockquote><blockquote><p><em>It's not either/or, it's <strong>both proactive and reactive</strong>, every day!</em></p></blockquote><blockquote><p><em>I agree with you that there is too much unused software and we should identify and remove as much of it. But unfortunately it gets much more nuanced. Did you know, while we keep talking about how 80-90 percent of your modern app code is open source, only 12% of the functions/lines-of-code within those libraries are actually used </em></p><p><em>But <strong>what do you expect an engineer to do? They can't simply remove the package</strong> because they are using 10 lines of code within it. </em></p></blockquote><p>In part 2 of this article series, I&#8217;m going to do my best to expand on these points, as well as a few other top-of-mind ideas I have about what PVPM can look like in practice.</p><p>Let&#8217;s dive in!</p><h1><strong>Proactive vuln management === secure-by-design/default?</strong></h1><p>Strictly speaking, secure-by-design/default (SBD/D) strategies applied to vulnerability management are necessarily proactive (i.e. entire classes of vulnerabilities are avoided with strong secure SDLC practices, configuration management, etc.). However, there&#8217;s more to proactive vulnerability management that secure-by-design/default approaches don&#8217;t necessarily account for.</p><p>SBD/D approaches applied to vulnerability management can make it so that, on day 1 of a system being provisioned, it&#8217;s free of vulnerabilities. However, over time a system&#8217;s vulnerability state will change as new vulnerabilities in existing software or configurations are uncovered by researchers and attackers.&nbsp;</p><p>If one were to apply a reactive vulnerability management approach in this scenario of using secure-by-design/default systems on day 1, it might look like:</p><ul><li><p>Scan running systems for vulnerabilities</p></li><li><p>Analyze and triage subset of vulnerabilities to remediate</p></li><li><p><em>For mutable systems</em>: schedule &amp; trigger patch deployments for running systems</p></li><li><p><em>For immutable systems</em>: manually trigger re-deployment of vulnerable systems using latest vulnerability-free image/template</p></li></ul><p>Conversely, a PVPM approach would look more like this:</p><ul><li><p><em>For mutable systems</em>: enable auto-patching setting/service/tool to check for and apply latest security updates on a regular basis with scheduled process/system restarts as needed</p></li><li><p><em>For immutable systems: </em>schedule systems for automated re-deployment on a regular basis (weekly, monthly, etc.) using latest vulnerability-free image/template</p></li></ul><p>Notably, PVPM doesn&#8217;t rely on those first two steps of vulnerability scanning &#8594; analysis/triage to drive remediation in already-provisioned systems. PVPM and SBD/D partially overlap with how they help with vulnerability management. But SBD/D doesn&#8217;t necessarily extend to post-day-1 of system provisioning.</p><p>You could argue that what I&#8217;ve described above <em>is</em> the definition of SBD/D, with PVPM merely being a feature of a secure-by-design system architecture. I&#8217;m not gonna argue with that because, well, it&#8217;s true!</p><p>I believe it&#8217;s beneficial, though, to be explicit about the distinction between the overarching umbrella category of SBD/D and the much more domain-specific and prescriptive concept of PVPM, such that we as a community are much more focused on figuring out practical ways to implement PVPM processes and tools vs. reiterating abstract InfoSec platitudes. Simply saying &#8220;well, that&#8217;s just SBD/D, which everyone should be doing anyway&#8221; doesn&#8217;t progress the conversation forward or drive the invention of more effective vulnerability management practices.</p><p>Alright, let&#8217;s take a break from acronyms for a moment and talk about proactive vs. reactive vulnerability management.</p><h1><strong>Reactive vs. proactive: why not both?</strong></h1><p>Indeed: why not?! While this may not have been clear in part 1 of this article series, I <em>do</em> believe that&nbsp;both reactive <strong>and</strong> proactive approaches are necessary ingredients for a strong vulnerability management program. Even if we do a perfect job at being proactive, it&#8217;s inevitable that we&#8217;ll need to keep being reactive, in large part due to 0-day vulnerabilities.&nbsp;</p><p>But let me reiterate my core point here: we currently invest <em>far </em>too many resources in reactive approaches at the expense of proactive ones. We have literally hit a point of diminishing returns with reactive vulnerability remediation, as demonstrated by <a href="https://www.cyentia.com/pithy-p2p/#:~:text=p2p%20vol.%203%3A%20winning%20the%20remediation%20race">Cyentia&#8217;s research on the subject</a>:&nbsp;</p><blockquote><p><em>The typical organization only fixes about 10% of its vulnerabilities in any given month. And that&#8217;s consistent regardless of how many assets are in the environment.</em></p></blockquote><h2><strong>The imbalance between reactive vs. proactive vulnerability management</strong></h2><p>In my mind, there is a significant imbalance around how organizations apply reactive and proactive vulnerability management approaches. In the context of a &#8220;vulnerability management funnel&#8221; that would make any Gartner analyst swoon from pure envy, this imbalance looks something like this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zwJT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zwJT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!zwJT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!zwJT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!zwJT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zwJT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zwJT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!zwJT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!zwJT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!zwJT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F32495eca-3868-4112-bafb-d4daaf8d4eb2_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Even with reactive remediation capabilities maxed out, an average organization will only be able to fix ~10% of vulnerabilities in their environment per month. At best, an above average vulnerability management program will have automated patch management in place for their easy-to-patch <strong>mutable systems</strong>, like end user compute devices running Windows, Mac, and (occasionally) Linux. This might allow them to fix ~15% of vulnerabilities in their environment per month.</p><p>In these cases, though, it's likely that organizations are still engaging in <em>reactive</em> vulnerability remediation: patch management tools are configured to automatically deploy patches <em>only</em> when certain types of vulnerabilities with specific attributes are detected. Sometimes this reactive scan &#8594; triage &#8594; patch approach is fully handled by the patch management tool itself (which probably won't have the most comprehensive vulnerability database) or it&#8217;s triggered by a vulnerability scanner that integrates with said patch management tool (which introduces complexity-induced issues, like inconsistencies with normalizing and mapping data between tools, or each tools' vuln database not consisting of the same CVEs, etc).</p><p><strong>Immutable systems</strong> are a whole different story. For all the <a href="https://devops.com/immutable-infrastructure-the-next-step-for-devops/">benefits immutable systems provide</a>, they are undoubtedly a vulnerability management footgun. Need to remediate a single vulnerability in an immutable infrastructure environment? Awesome! Just follow this super-fast-and-simple, definitely-not-cumbersome process that flows across three distinct systems (SCM &#8594; CI &#8594; CD):</p><ol><li><p>Kick off base image creation process with vulnerability remediation technique applied </p></li><li><p>Update CD pipeline and runtime scaling configs to utilize new base image</p></li><li><p>Never forget: they built it, <em>they</em> own it! &#8220;They&#8221; being software developers (i.e. service owner teams). So, you&#8217;ll now make a heartfelt plea to them to re-deploy their service utilizing this new base image at their earliest convenience, ideally sooner than later so InfoSec will stop nagging you</p></li><li><p>Respond to a bunch of pages when stuff inevitably hits the fan</p></li><li><p>Rollback these changes and defer this pesky security work to Q5 20never.</p></li></ol><p>Sorry, I lied: this is clearly the dictionary definition of cumbersome. The inherent difficulty of even <em>reactively </em>remediating vulnerabilities in these types of environments results in a lot of avoidance with having to engage in this process at all. Over time, immutable infrastructure ends up being riddled with a lot of lingering vulnerabilities that get patched occasionally or only when push comes to shove. </p><p>Don't get me wrong: it's 1000% possible to streamline this redeploy-to-patch process. Some organizations have automated this process to a large extent, even going as far as proactively redeploying services on a regular basis with the latest patched base image. But it requires a concerted and coordinated effort for organizations to get to this state of maturity and, as far as I know, few organizations have achieved this state.</p><p>Then there are <strong>self-hosted vendor software products</strong>. I&#8217;ve rarely seen or heard of any organization engaging in proactive remediation for these types of systems. Maybe that's part of the reason why there have been <a href="https://spectrum-ieee-org.cdn.ampproject.org/c/s/spectrum.ieee.org/amp/lean-software-development-2667183018">so many high-profile breaches </a>caused by exploitation of these vuln-infested products.&nbsp;Think about how <em>awful</em> 2023 was for organizations that were running even just a few of the self-hosted vendor products that were ruthlessly exploited last year. I wouldn&#8217;t be surprised if a good number of organizations were using 5 or more of these products last year and had to deal with regular emergency patching exercises that burned out their teams:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ZS_o!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ZS_o!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZS_o!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZS_o!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZS_o!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ZS_o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg" width="999" height="1600" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1600,&quot;width&quot;:999,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ZS_o!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg 424w, https://substackcdn.com/image/fetch/$s_!ZS_o!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg 848w, https://substackcdn.com/image/fetch/$s_!ZS_o!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!ZS_o!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2f0912be-93e1-4d5a-87cd-f8db8fee361e_999x1600.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Excerpt from SentinelOne&#8217;s Watchtower report for end of year 2023 showing top exploited vulnerabilities, a vast majority of them being associated with self-hosted vendor software products </figcaption></figure></div><p>It doesn't help that the update process for each vendors&#8217; product vary wildly: some allow automated updates to be enabled, others don't; some require you to login to a support portal site and dig through 5 layers of menus to download an installer locally and push it to your devices with a proprietary GUI tool; others recognize you&#8217;re a living breathing human and would never subject you to this level of cruelty.</p><p>And it <em>especially</em> doesn't help that there aren't really any vendor-agnostic patch management tools that make it easy to centrally and automatically deploy patches across such a diverse set of vendor products. A typical organization might have one vendor for their file transfer system, one for their next gen firewalls, one for their VPN, one for their virtual desktop infrastructure, one for - ok, you get the idea.&nbsp;</p><p>Sounds like the perfect kind of problem for a security startup to tackle?!</p><p>But I digress&#8230;</p><h2><strong>Re-balancing our focus on proactive vulnerability management</strong></h2><p>Back to my original premise: what if we pivoted our focus toward maxing out our <em>proactive</em> vulnerability management capabilities first and foremost? Yes, we still need to do reactive vulnerability management. Yes, active mitigations are still a necessary part of our strategy. Yes, we&#8217;ll probably still have residual vulnerabilities in our environment.&nbsp;</p><p>However, if we do this right and we do it well, we should have far far fewer residual vulnerabilities lingering in our environment with a lot of time savings to boot. Behold: yet another Gartner-analyst-swoon-inducing vulnerability management funnel:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1qEA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1qEA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!1qEA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!1qEA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!1qEA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1qEA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/db8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1qEA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!1qEA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!1qEA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!1qEA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fdb8b81ed-88d7-45ed-be73-cf839b9fc86e_1600x900.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Imagine if we lived in <em>this</em> world instead of the one we currently occupy,&nbsp;a world where we <em>only</em> need to perform <em>reactive</em> vulnerability management in the context of zero day vulnerabilities and new classes of misconfigurations.</p><p>MOVEit-style mass exploitation events lasting <em>months</em> quickly become a thing of the past. When active exploitation of an N-day vulnerability starts to pick up, most organizations would have already <em>proactively</em> installed the latest security update without waiting to sift through vulnerability scan results before triggering their emergency vulnerability incident response process.&nbsp;</p><p>Would this state be very hard to achieve? Heck yes.&nbsp;</p><p>Would it be worth it? A thousand times yes.&nbsp;</p><p>Is it possible to do? I believe so, yes. Think about this: in the 1960s, using 1960s-era technology, we strapped a few humans inside a metal box, precisely launched them thousands of miles to the Moon, had them bop around on its surface - in hard vacuum -&nbsp; using &#8220;portable atmosphere&#8221; suits, and then safely brought them back to Earth by (slowly) crashing them into the ocean. In the 1960s. 60 years ago.</p><p>By comparison, this should be a walk in the park.</p><p>In fact, we&#8217;ve already started making progress in this direction as an industry. Proactive vulnerability management tools exist <em>today</em>.&nbsp;</p><p>Let&#8217;s take a look at some of them, shall we?</p><h1><strong>Proactive vulnerability management tools: some examples</strong></h1><p><em>Disclaimer: I&#8217;m about to discuss some open source and commercial tools, largely from a point of excitement about what I currently see as useful examples of tools that fit the PVPM model. I was not compensated in any way, shape, or form for discussing these tools in a positive light. Likewise, these are personal opinions, not professional endorsements, and as such you should use your judgment when exploring or utilizing these tools.</em></p><h2><strong>Containers</strong></h2><p><strong><a href="https://www.chainguard.dev/">Chainguard</a></strong>: someone call Gartner and tell them it&#8217;s time to coin the term &#8220;Proactive Vulnerability Annihilation (PVA)&#8221; because that&#8217;s <em>exactly</em> the capability Chainguard provides as the <em>de facto</em> visionary leader in this totally-made-up-just-for-this-article product category (credit goes to <a href="https://www.linkedin.com/posts/jordimoncompanys_chainguard-techrevolution-codeprotection-activity-7160972411381698560-JY0x?utm_source=share&amp;utm_medium=member_desktop">Jordi Mon Companys </a>for inspiring this name). Chainguard Images are the best example of Proactive Vulnerability Patch Management (PVPM) in practice: unused software components are stripped out or not added in the first place, and all known CVEs for included software components are patched before a container image is published.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-sbh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-sbh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-sbh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-sbh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-sbh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-sbh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg" width="1129" height="651" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:651,&quot;width&quot;:1129,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-sbh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg 424w, https://substackcdn.com/image/fetch/$s_!-sbh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg 848w, https://substackcdn.com/image/fetch/$s_!-sbh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!-sbh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F94979f8c-3f5d-41b8-86a2-708d5aa02830_1129x651.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>El Risitas emphasis my own</em></figcaption></figure></div><p>In other words: Chainguard takes a highly disciplined and methodical approach to proactively yeeting all known CVEs into /dev/null each time they produce a new freely-available, zero CVE container image. It&#8217;s like vulnerability management magic!</p><p><em>(No, they didn&#8217;t pay me to write this (yes, they probably should have (lolol I&#8217;m just kidding, Dan!!(&#8230;or am I?))))</em></p><h2><strong>General purpose OSes</strong></h2><h4><strong>macOS</strong></h4><p><strong><a href="https://github.com/Mac-Nerd/patchomator">Patchomator</a> &amp; <a href="https://github.com/robjschroeder/App-Auto-Patch/tree/main">App Auto-Patch</a>: </strong>both of these open source tools automatically install the latest updates for popular macOS apps without giving a <em>hoot</em> about what your vulnerability scanner has to say about detected CVEs. While these are easy to run locally, they are also designed to be deployed via Jamf other MDM tools. App Auto-Patch also has a nice SwiftDialog UI/UX that can be customized to be fully interactive for end users, partially interactive, or totally silent. They both use <a href="https://github.com/Installomator/Installomator">Installomator</a> under the hood for consistent and secure automated installation of the latest version of hundreds software packages. Hooray for open source and the Mac Admins community!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3GFR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3GFR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png 424w, https://substackcdn.com/image/fetch/$s_!3GFR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png 848w, https://substackcdn.com/image/fetch/$s_!3GFR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png 1272w, https://substackcdn.com/image/fetch/$s_!3GFR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3GFR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png" width="762" height="740" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:740,&quot;width&quot;:762,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3GFR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png 424w, https://substackcdn.com/image/fetch/$s_!3GFR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png 848w, https://substackcdn.com/image/fetch/$s_!3GFR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png 1272w, https://substackcdn.com/image/fetch/$s_!3GFR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0c099019-57a6-4581-94fa-de87ad7c0ca6_762x740.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h4><strong>Windows, macOS, Linux</strong></h4><p><strong><a href="https://www.vicarius.io/">Vicarius</a>: </strong>they're<strong> </strong>a newer player in a space formerly dominated by BigFix and probably-currently being dominated by Automox. I hadn't heard of them before until someone mentioned them in response to part 1 of this article series (thanks, Michael!)</p><p>While Vicarius doesn&#8217;t necessarily focus on the &#8220;removed unused software&#8221; part of PVPM like Chainguard does (although I&#8217;m sure with some fiddling you could make their automation functionality do this), they seem to have a strong approach to proactively patching <em>a lot </em>of different software across these three OSes. At the time of this writing, they support patching&nbsp; 523 Windows apps (including common enterprise software like Splunk, presumably the Splunk agent), 646 macOS apps, and 2077 Linux apps. I <em>suspect</em> they're piggybacking off well-established package managers, but hey, good for them if that's the case! No need to reinvent the wheel here.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!G3bs!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!G3bs!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png 424w, https://substackcdn.com/image/fetch/$s_!G3bs!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png 848w, https://substackcdn.com/image/fetch/$s_!G3bs!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png 1272w, https://substackcdn.com/image/fetch/$s_!G3bs!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!G3bs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png" width="1290" height="1342" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1342,&quot;width&quot;:1290,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!G3bs!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png 424w, https://substackcdn.com/image/fetch/$s_!G3bs!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png 848w, https://substackcdn.com/image/fetch/$s_!G3bs!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png 1272w, https://substackcdn.com/image/fetch/$s_!G3bs!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed1f4f26-3216-4adb-a0ef-d3c0dbcff6be_1290x1342.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As an added benefit, they also have some active mitigation features called &#8220;Patchless Protection'' which especially helps with 0-day scenarios when a patch isn't yet available. It seems IPS-esque, as if it&#8217;s&#8230;<em>extending</em> traditional IPS functionality to cover specific&#8230;<em>endpoint</em> software&#8230;like some sort &#8230;I dunno&#8230;eXtended Endpoint IPS&#8230;an&#8230;X&#8230;E&#8230;IPS?&nbsp;</p><p>An XEIPS?!</p><p>We could pronounce it as &#8220;ZEE-ps&#8221;!!!</p><p>(God I hope someone from Gartner is reading this&#8230;)</p><p><strong><a href="https://trackd.com/">trackd</a></strong>: even <em>newer</em> than Vicarius is trackd. They are the closest thing to a PVPM-centric tool I&#8217;ve ever come across: they recognize that the root cause of poor patching practices is <em>fear</em> of patches breaking things. Thus, their key selling point is crowdsourcing telemetry about patch stability to allow you to engage in what I like to call &#8220;Fearless Patch Management.&#8221; For that reason, a basic version of their product is free and will always be free - give it a shot!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!l0Pl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!l0Pl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png 424w, https://substackcdn.com/image/fetch/$s_!l0Pl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png 848w, https://substackcdn.com/image/fetch/$s_!l0Pl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png 1272w, https://substackcdn.com/image/fetch/$s_!l0Pl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!l0Pl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png" width="1456" height="640" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:640,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:210554,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!l0Pl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png 424w, https://substackcdn.com/image/fetch/$s_!l0Pl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png 848w, https://substackcdn.com/image/fetch/$s_!l0Pl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png 1272w, https://substackcdn.com/image/fetch/$s_!l0Pl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1c70f759-8793-48a9-9106-c4e413ab179a_2101x923.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;m really excited about how trackd can help drive organizations toward fearless, proactive vulnerability patching. Definitely keep an eye on them! </p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!yTo-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!yTo-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png 424w, https://substackcdn.com/image/fetch/$s_!yTo-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png 848w, https://substackcdn.com/image/fetch/$s_!yTo-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png 1272w, https://substackcdn.com/image/fetch/$s_!yTo-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!yTo-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png" width="768" height="334" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:334,&quot;width&quot;:768,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!yTo-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png 424w, https://substackcdn.com/image/fetch/$s_!yTo-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png 848w, https://substackcdn.com/image/fetch/$s_!yTo-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png 1272w, https://substackcdn.com/image/fetch/$s_!yTo-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57f90ac-2e9b-4092-b173-750c079d60c0_768x334.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2><strong>Source code</strong></h2><p>Ok, here&#8217;s the thing about first-party and third-party code remediation, which every software developer who&#8217;s ever had to deal with it knows: it&#8217;s an absolute PITA. And while aspects of PVPM like systematically removing unused software makes sense in the context of third-party libraries, it doesn&#8217;t really apply to first-party code (unless you&#8217;re writing a bunch of vulnerable code that end users would never interact with but attackers could have a field day with, in which case you should probably be banned from using the internet until the end of time).</p><p>Likewise, trying to proactively auto-remediate vulnerabilities in third-party source code is a fool&#8217;s errand like none other: unless a fix path for a third-party library includes a security patch version, minor and major version updates tend to contain breaking changes that require time intensive analysis, code refactoring, and test suite updates to avoid.</p><p>So, it&#8217;s pretty safe to say that PVPM just isn&#8217;t applicable to the domain of source code vulnerability management.</p><p></p><p>&#8230;</p><p></p><p>&#8230;&#8230;</p><p></p><p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;</p><p></p><p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;</p><p></p><p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;</p><p></p><p>&#8230;&#8230;</p><p></p><p>&#8230;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!C4W_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!C4W_!,w_424,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif 424w, https://substackcdn.com/image/fetch/$s_!C4W_!,w_848,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif 848w, https://substackcdn.com/image/fetch/$s_!C4W_!,w_1272,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif 1272w, https://substackcdn.com/image/fetch/$s_!C4W_!,w_1456,c_limit,f_webp,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!C4W_!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif" width="640" height="640" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:640,&quot;width&quot;:640,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!C4W_!,w_424,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif 424w, https://substackcdn.com/image/fetch/$s_!C4W_!,w_848,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif 848w, https://substackcdn.com/image/fetch/$s_!C4W_!,w_1272,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif 1272w, https://substackcdn.com/image/fetch/$s_!C4W_!,w_1456,c_limit,f_auto,q_auto:good,fl_lossy/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7ac39532-9c50-4b23-877b-6cb213a32361_640x640.gif 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>PSYCH! </p><p>PVPM is <em>totally</em> relevant to source code vulnerability management. There are at least two new products on the market that can help implement PVPM (insofar as it&#8217;s possible to do so) for code vulnerability management without it being a total PITA.&nbsp;</p><p>From what I can tell, these two products differentiate themselves from existing proactive code vulnerability management patterns and tools, such as:</p><ul><li><p>Secure code libraries that make it easy to avoid entire classes of vulnerabilities (SQLi, XSS, XXE, etc,) by providing securely-defined classes, methods, functions, etc. to developers</p></li><li><p>SCM and CI integrations that block commits and fail build jobs when certain vulnerability conditions are met</p></li></ul><p>Let&#8217;s take a look at how these tools uniquely contribute to a PVPM model for code!</p><p><strong><a href="https://www.moderne.io/">Moderne</a> (and <a href="https://docs.openrewrite.org/">OpenRewrite</a>):</strong> Yes, existing software composition analysis (SCA) tools like Snyk and Dependabot can automatically open PRs to update your third-party libraries, and even static application security testing (SAST) tools like Semgrep have &#8220;auto-fix&#8221; recommendation engines that will use regex matching to make it easy to find-and-replace vulnerable first-party code with remediated code. However, these tools are by default reactive: first, you scan your code for known vulnerabilities - <em>then</em> you remediate them.&nbsp;</p><p>Moderne takes a different approach. First, it uses a novel code data model called <a href="https://www.moderne.io/technology">Lossless Semantic Trees</a> (LST) to perform highly accurate, format preserving, type aware, error tolerant code <em><a href="https://en.wikipedia.org/wiki/Code_refactoring">refactoring</a></em> when remediating vulnerabilities. This is especially valuable when doing version migrations of runtime environments and frameworks (which is necessary sometimes to remediate vulnerabilities or add new security features), across multiple teams&#8217; code (which is a huge pain-in-the-backside change to try to drive). This fits into the PVPM framework in my mind when you start to recognize that these major version migrations can now be done faster and with more confidence, making them easier to do proactively well before a runtime environment or framework end-of-life date comes about.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PLgn!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PLgn!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png 424w, https://substackcdn.com/image/fetch/$s_!PLgn!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png 848w, https://substackcdn.com/image/fetch/$s_!PLgn!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png 1272w, https://substackcdn.com/image/fetch/$s_!PLgn!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PLgn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png" width="1456" height="622" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:622,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PLgn!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png 424w, https://substackcdn.com/image/fetch/$s_!PLgn!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png 848w, https://substackcdn.com/image/fetch/$s_!PLgn!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png 1272w, https://substackcdn.com/image/fetch/$s_!PLgn!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff946c697-4043-431f-aff8-5c48b4d46b5d_1600x683.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Full disclosure: I have no idea what &#8220;Lossless Semantic Trees&#8221; or &#8220;Abstract Syntax Trees&#8221; are, and - let&#8217;s be honest - that last paragraph above probably only makes sense to software developers and computer science majors, not InfoSec plebes like me.</em></figcaption></figure></div><p>Because Moderne uses LSTs, it&#8217;s in a much better position to thoroughly and accurately understand how code is utilized throughout an application across multiple codebases. This presumably is what makes it possible for them to have a pretty accurate &#8220;<a href="https://docs.openrewrite.org/recipes/java/removeunusedimports">remove unused imports</a>&#8221; recipe, which fits in nicely with &#8220;remove unused software&#8221; stage of our PVPM framework.</p><p>There is at least one big drawback about Moderne <em>currently:</em> their vulnerability detections and insecure code remediation &#8220;recipes&#8221; aren&#8217;t nearly at parity with your typical SCA and SAST tool. Granted, Moderne is <em>very</em> new, so given enough time and intentional focus, they could certainly build out a rich library of recipes that make it easy to proactively auto-remediate vulnerabilities at scale in ways that existing SAST and SCA tools might struggle with doing.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MIDU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MIDU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png 424w, https://substackcdn.com/image/fetch/$s_!MIDU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png 848w, https://substackcdn.com/image/fetch/$s_!MIDU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png 1272w, https://substackcdn.com/image/fetch/$s_!MIDU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MIDU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png" width="817" height="731" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b32e976c-f313-43a4-9ce1-445561060f0a_817x731.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:731,&quot;width&quot;:817,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MIDU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png 424w, https://substackcdn.com/image/fetch/$s_!MIDU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png 848w, https://substackcdn.com/image/fetch/$s_!MIDU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png 1272w, https://substackcdn.com/image/fetch/$s_!MIDU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb32e976c-f313-43a4-9ce1-445561060f0a_817x731.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But don&#8217;t take my word for it, either way! Test out Moderne yourself using their free community edition.</p><p><strong><a href="https://seal.security/">Seal Security</a></strong>: this company is basically a software security superhero. They are diving headfirst into other people&#8217;s open source codebases and very precisely patching (&#8220;sealing&#8221;) vulnerabilities in them, even across multiple older versions of a given codebase. Given how new of a company they are, their <a href="https://github.com/seal-community/patches/tree/main">security patch version repository </a>is pretty well built out, supporting multiple popular languages with a good number of patches for Node libraries especially.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DK8H!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DK8H!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png 424w, https://substackcdn.com/image/fetch/$s_!DK8H!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png 848w, https://substackcdn.com/image/fetch/$s_!DK8H!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png 1272w, https://substackcdn.com/image/fetch/$s_!DK8H!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DK8H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png" width="1456" height="574" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:574,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DK8H!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png 424w, https://substackcdn.com/image/fetch/$s_!DK8H!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png 848w, https://substackcdn.com/image/fetch/$s_!DK8H!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png 1272w, https://substackcdn.com/image/fetch/$s_!DK8H!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2321151c-ce15-45d3-b880-9e78adce867e_1487x586.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Then they have their <code>seal</code> CLI tool that makes it easy to patch a vulnerable library on demand or on the fly. This makes it much more feasible to <em>proactively</em> patch third-party libraries, knowing that you&#8217;re only updating to a patch version where the only code change is a bespoke vulnerability fix, not a breaking change.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!fd4T!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!fd4T!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png 424w, https://substackcdn.com/image/fetch/$s_!fd4T!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png 848w, https://substackcdn.com/image/fetch/$s_!fd4T!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png 1272w, https://substackcdn.com/image/fetch/$s_!fd4T!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!fd4T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png" width="1456" height="592" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:592,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!fd4T!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png 424w, https://substackcdn.com/image/fetch/$s_!fd4T!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png 848w, https://substackcdn.com/image/fetch/$s_!fd4T!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png 1272w, https://substackcdn.com/image/fetch/$s_!fd4T!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6f077988-ec52-440c-89e8-42f1fd735f41_1600x650.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Seal Security is making it so that we can have our &#8220;third-party code vulnerability auto-remediation&#8221; cake and eat it too.</p><p>Thank you, Seal Security, for saving the world from insecure software, one patch at a time &#129761;</p><h1><strong>Concluding thoughts</strong></h1><p>I hope this part 2 article of &#8220;Are we doing vulnerability management all wrong?&#8221; provided something of value for you. I&#8217;d love to get your feedback or perspective on what I&#8217;ve laid out here, especially if I misrepresented or misunderstood anything I&#8217;ve said!</p><p>Coming up next: part 3 where I cook up a hot take about risk-based vulnerability management and where I see it missing the mark. I may even offer up a universal vulnerability risk rating model that more precisely accounts for realistic risk attributes that more directly correlate with attacker behavior and motivations. Likewise, I&#8217;ll sprinkle in some thoughts on risk-based remediation SLAs.</p><p>Stay tuned!</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management-034?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management-034?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sensiblesecurity.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Sensible Security! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Are we doing vulnerability management all wrong? Part 1: Probably]]></title><description><![CDATA[A call to action for more innovation and focus on proactive vulnerability management]]></description><link>https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management</link><guid isPermaLink="false">https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management</guid><dc:creator><![CDATA[Justin Pagano]]></dc:creator><pubDate>Thu, 02 Nov 2023 10:54:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uxCC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uxCC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uxCC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!uxCC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!uxCC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!uxCC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uxCC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/bdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uxCC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png 424w, https://substackcdn.com/image/fetch/$s_!uxCC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png 848w, https://substackcdn.com/image/fetch/$s_!uxCC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png 1272w, https://substackcdn.com/image/fetch/$s_!uxCC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fbdd19c3b-0230-432c-8849-f50995f4759d_1600x900.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Attackers continue to give us a run for our money, overshadowing and calling into question the effectiveness of reactive vulnerability management approaches</figcaption></figure></div><blockquote><p><em><strong>Update</strong>: <a href="https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management-034">part 2</a> is out!</em></p></blockquote><p>Is it just me or is vulnerability management having a renaissance moment? <a href="https://www.first.org/cvss/v4-0/">CVSS 4.0 is hot off the presses</a>, <a href="https://arxiv.org/abs/2302.14172">EPSS 3.0</a> was released earlier this year, and <a href="https://resources.sei.cmu.edu/library/asset-view.cfm?assetID=636379">SSVC</a> is finally getting the <a href="https://stephenshaffer.io/flipping-the-vulnerability-management-model-cvss-ssvc-aaa78f1426e1">attention it deserves</a> as a meaningful alternative to CVSS.</p><p>And yet, even with all of this innovation happening around vulnerability prioritization methods, <em>truly</em> efficient and effective vulnerability management <a href="https://www.qualys.com/forms/tru-research-report/#:~:text=On%20average%2C%20weaponized,organizations%20begin%20patching.">still</a> <a href="https://blog.fox-it.com/2023/08/15/approximately-2000-citrix-netscalers-backdoored-in-mass-exploitation-campaign/">seems</a> <a href="https://www.darkreading.com/vulnerabilities-threats/rackspace-ransomware-incident-highlights-risks-mitigation-alone">out</a> of <a href="https://techcrunch.com/2023/08/14/millions-americans-health-data-moveit-hackers-clop-ibm/">reach</a> for <a href="https://www.reuters.com/technology/moveit-hack-spawned-around-600-breaches-isnt-done-yet-cyber-analysts-2023-08-08/">many</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!omXF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!omXF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png 424w, https://substackcdn.com/image/fetch/$s_!omXF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png 848w, https://substackcdn.com/image/fetch/$s_!omXF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png 1272w, https://substackcdn.com/image/fetch/$s_!omXF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!omXF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png" width="538" height="292.64835164835165" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:792,&quot;width&quot;:1456,&quot;resizeWidth&quot;:538,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!omXF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png 424w, https://substackcdn.com/image/fetch/$s_!omXF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png 848w, https://substackcdn.com/image/fetch/$s_!omXF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png 1272w, https://substackcdn.com/image/fetch/$s_!omXF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F61fa377e-3765-40c0-aac8-d73bd7484ace_1600x870.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>Key finding from Qualys&#8217; 2023 <a href="https://www.qualys.com/forms/tru-research-report/#:~:text=On%20average%2C%20weaponized,organizations%20begin%20patching.">TruRisk Research Report</a></em></figcaption></figure></div><p>Why is that?&nbsp;</p><p>Is vulnerability management a fundamentally intractable problem with an <a href="https://www.cyentia.com/pithy-p2p/#:~:text=The%20typical%20organization%20only%20fixes%20about%2010%25%20of%20its%20vulnerabilities%20in%20any%20given%20month.%20And%20that%E2%80%99s%20consistent%20regardless%20of%20how%20many%20assets%20are%20in%20the%20environment.%20This%20was%20a%20big%20eye%2Dopener%20to%20us%20and%20hammered%20home%20the%20point%20that%20prioritization%20was%20absolutely%20essential%20for%20effective%20VM.">upper limit</a> on the proportion of vulnerabilities any organization can fix?&nbsp;</p><p>Is it destined to be a game of <a href="https://news.sophos.com/en-us/2023/04/04/defenders-vs-adversaries-the-two-speed-cybersecurity-2023-race/">cat and mouse</a> that <a href="https://www.cyentia.com/who-holds-the-advantage/">attackers tend to win</a> in the long run?&nbsp;&nbsp;</p><p>Or, perhaps, are we approaching vulnerability management all wrong?</p><h1><strong>Background</strong></h1><p>I&#8217;ve spent the past 11+ years focusing on vulnerability management from various perspectives: security operations, application security, cloud security, network security, and GRC. In that time, through direct experience, learning from others, reviewing research, and experimenting with industry best practices, I&#8217;ve come to the conclusion that we&#8217;re approaching vulnerability management all wrong.</p><p>Ok, I&#8217;m being slightly hyperbolic. But in all honesty, we as an industry seem <em>excessively</em> focused on <strong>reactive</strong><em> </em>vulnerability management strategies that amount to peering into a high-tech crystal ball to predict what vulnerabilities on which of our assets are most likely to be exploited and result in the worst impact, and then focusing our remediation efforts <em>solely</em> on those vulnerabilities.&nbsp;</p><p>This bias toward reactive vulnerability management is as much understandable as it is untenable: remediating vulnerabilities is a painstaking process, and no organization&#8217;s mission is &#8220;keep our sh!t patched and vulnerability free&#8221; - indeed, far from it. However, I contend that we have overcorrected our focus on reactive strategies at the expense of proactive ones, resulting in remarkably <a href="https://en.wikipedia.org/wiki/2023_MOVEit_data_breach">bad</a> <a href="https://securitylabs.datadoghq.com/articles/confluence-vulnerability-cve-2023-22515-overview-and-remediation/">vulnerability</a> <a href="https://www.bleepingcomputer.com/news/security/over-640-citrix-servers-backdoored-with-web-shells-in-ongoing-attacks/">management</a> <a href="https://www.bleepingcomputer.com/news/security/hackers-update-cisco-ios-xe-backdoor-to-hide-infected-devices/">outcomes</a> over the years.</p><p>So, let&#8217;s talk about what <strong>proactive</strong> vulnerability management is and what else we can do to innovate it. In this article, I&#8217;m going to describe:</p><ol><li><p>The key differences between reactive and proactive vulnerability management</p></li><li><p>An example framework and strategy for proactive vulnerability management&nbsp;</p></li></ol><p>I plan to release future articles that cover additional topics, such as how to better balance and integrate reactive and proactive vulnerability management strategies, examples of specific techniques and tools to use to put these ideas into practice, etc.</p><p>Until then, let&#8217;s dive in!</p><h1><strong>Reactive vs. Proactive Vulnerability Management</strong></h1><p><strong>Reactive vulnerability management</strong> is the approach that the growing array of <a href="https://www.google.com/search?q=risk-based+vulnerability+management&amp;sca_esv=557255143&amp;source=hp&amp;ei=2w_cZL6kC-uhptQPkfaCoAc&amp;iflsig=AD69kcEAAAAAZNwd65-igyHSx-BG9sSSsYjEm-_iGAJr&amp;oq=risk-based+vulnerabi&amp;gs_lp=Egdnd3Mtd2l6IhRyaXNrLWJhc2VkIHZ1bG5lcmFiaSoCCAAyBRAAGIAEMgUQABiABDIFEAAYgAQyBhAAGBYYHjIGEAAYFhgeMgYQABgWGB4yBhAAGBYYHjIGEAAYFhgeMgYQABgWGB4yBhAAGBYYHkjZGVAAWO4RcAB4AJABAJgBc6ABlg6qAQQxNy4zuAEByAEA-AEBwgILEC4YgAQYsQMYgwHCAggQABiABBixA8ICERAuGIAEGLEDGIMBGMcBGNEDwgILEC4YigUYsQMYgwHCAgsQABiKBRixAxiDAcICCxAAGIAEGLEDGIMBwgIREC4YgAQYsQMYgwEYxwEYrwHCAgsQLhiABBjHARivAcICCBAuGIAEGLEDwgIFEC4YgATCAgcQABiABBgKwgIIEAAYFhgeGA8&amp;sclient=gws-wiz">four</a> <a href="https://arxiv.org/abs/2302.14172">letter</a> <a href="https://resources.sei.cmu.edu/library/asset-view.cfm?assetID=636379">acronyms</a> and proprietary <a href="https://help.kennasecurity.com/hc/en-us/articles/204133049-How-is-a-risk-meter-score-determined-">vulnerability</a> <a href="https://blog.qualys.com/vulnerabilities-threat-research/2022/12/16/implement-risk-based-vulnerability-management-with-qualys-trurisk-part-2#:~:text=Qualys%20TruRiskTM%20Score%20of,an%20asset%20considers%20multiple%20factors.">risk</a> <a href="https://www.rapid7.com/products/insightvm/features/real-risk-prioritization/">scoring</a> <a href="https://orca.security/resources/blog/simplify-cloud-risk-prioritization-with-granular-alert-scoring/#:~:text=The%20Orca%20Risk%20Score%20ranges,and%20urgency%20of%20each%20alert.">methods</a> are propping up. For many security practitioners, it is the all-too-familiar <a href="https://lowres.cartooncollections.com/boulder-rock-push-pushing-hills-myths-legends-CX909088_low.jpg">Sisyphean hamster wheel</a> of scan -&gt; triage -&gt; report &#8594; patch that never seems to truly <a href="https://www.cyentia.com/wp-content/uploads/2023/07/Screenshot-2023-07-25-at-2.01.03-PM-1536x1018.jpg">move the needle over the long run</a>.&nbsp;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T9OX!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T9OX!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png 424w, https://substackcdn.com/image/fetch/$s_!T9OX!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png 848w, https://substackcdn.com/image/fetch/$s_!T9OX!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png 1272w, https://substackcdn.com/image/fetch/$s_!T9OX!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T9OX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png" width="1456" height="752" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:752,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T9OX!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png 424w, https://substackcdn.com/image/fetch/$s_!T9OX!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png 848w, https://substackcdn.com/image/fetch/$s_!T9OX!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png 1272w, https://substackcdn.com/image/fetch/$s_!T9OX!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3cd8ff8c-54bd-4013-bb2b-b40395bc4b0d_1600x826.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>The traditional reactive vulnerability management lifecycle (<a href="https://www.crowdstrike.com/cybersecurity-101/vulnerability-management/vulnerability-management-lifecycle/">image courtesy of CrowdStrike</a>)</em></figcaption></figure></div><p>It posits that because we&#8217;ve tried and failed over the years to &#8220;patch all the things&#8221;, we must settle on only patching what we <em>think </em>attackers are most likely to exploit on systems that <em>we</em> as defenders believe will be impacted the worst. This reactive approach is commonly referred to as &#8220;<a href="https://assets-powerstores-com.s3.amazonaws.com/data/org/20033/media/doc/gartner_s_strategic_vision_for_vulnerability_management_15998516437370014obf-374cac7236d6163e8bb34b4faa465965.pdf">risk-based vulnerability management</a>.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!zvKB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!zvKB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png 424w, https://substackcdn.com/image/fetch/$s_!zvKB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png 848w, https://substackcdn.com/image/fetch/$s_!zvKB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png 1272w, https://substackcdn.com/image/fetch/$s_!zvKB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!zvKB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png" width="589" height="206.3118131868132" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:510,&quot;width&quot;:1456,&quot;resizeWidth&quot;:589,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!zvKB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png 424w, https://substackcdn.com/image/fetch/$s_!zvKB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png 848w, https://substackcdn.com/image/fetch/$s_!zvKB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png 1272w, https://substackcdn.com/image/fetch/$s_!zvKB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26fc5c27-8bc7-472f-a81b-c78e5d12a097_1600x560.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption"><em>&#8220;Don&#8217;t try to patch everything:&#8221; risk-based vulnerability management is InfoSec&#8217;s ultimate frenemy, holding us back from achieving true excellence in vulnerability management</em></figcaption></figure></div><p><strong>Proactive vulnerability management</strong>, on the other hand, is any activity that remediates vulnerabilities without waiting to scan, triage, or report on them. It posits that, over time, you <em>can</em> patch just about every piece of software that can be patched.</p><p>At its core, this concept isn&#8217;t all that groundbreaking: it ultimately boils down to solid patch management, configuration management, and system hardening. InfoSec practitioners have long talked about the fundamental importance of each of these, within and outside the context of vulnerability management. These aren&#8217;t new ideas by a long shot.</p><p>Unfortunately, I don&#8217;t see us as an industry investing nearly enough time and energy into innovating in areas of proactive vulnerability management. This lack of innovation is holding us back from being able to consistently fix vulnerabilities faster than attackers exploit them.</p><h1><strong>New Ideas for Proactive Vulnerability Management&nbsp;</strong></h1><p>While patch management, and especially automated patching, is often mentioned in discussions about how to do vulnerability management really well, I have rarely come across any discussions about how to do patch management really well. Sure, there are well-known vendor tools in this space, such as SCCM, BigFix, and Automox. However, these are just patch automation and deployment tools that don&#8217;t have much of an opinion about how you <em>ought</em> to do patch management. More often than not, they simply reinforce reactive vulnerability management by focusing your patching efforts around known CVEs, CVSS scores, etc.</p><p>So, what would it look like to innovate in this area to modernize patch management with a much more proactive focus?</p><h2><strong>Proactive Vulnerability Patch Management Lifecycle (PVPM)</strong></h2><p>This wouldn&#8217;t be a thought leadership article about vulnerability management without another four letter acronym! Joking aside, what I refer to here as &#8220;PVPM&#8221; is how I envision proactive vulnerability management at a high level.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uG9A!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uG9A!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!uG9A!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!uG9A!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!uG9A!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uG9A!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png" width="1456" height="819" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:819,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:238949,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uG9A!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png 424w, https://substackcdn.com/image/fetch/$s_!uG9A!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png 848w, https://substackcdn.com/image/fetch/$s_!uG9A!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png 1272w, https://substackcdn.com/image/fetch/$s_!uG9A!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F5d2b59e9-8713-435e-bb19-eb8b96ca6103_2560x1440.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">PVPM in a nutshell</figcaption></figure></div><p>It&#8217;s a continuous lifecycle that is intended to produce high quality and highly effective auto-patching workflows that fix vulnerabilities fast without waiting to scan for them.&nbsp;</p><p>It&#8217;s a framework meant to enable organizations to consistently beat attackers at the vulnerability management game by driving a threat-centric focus around what to start auto-patching, when, how, and how often.</p><p><strong>Automation is a must for this to work and is intended to be a key aspect of each stage in every phase of this lifecycle.</strong></p><p>Let's break down what each phase and their corresponding stages entails.</p><h3><strong>Inventory</strong></h3><p>Like any good security practitioner knows, you can&#8217;t secure what you can&#8217;t see. Whether we&#8217;re talking about desktop software, server software, application libraries, container images, or anything in between, having a complete and continuously updated software inventory is absolutely essential to understand what needs patching.</p><ul><li><p><strong>Usage Analysis: </strong>this step of the inventory phase is all about understanding how software is <em>used</em> on systems. Is a particular piece of software running constantly, day in and day out? Or does it only run when a user launches it as needed? Or, perhaps, has it never run and thus is worth removing from a system entirely, permanently <em>and proactively</em> shrinking its vulnerability attack surface?</p></li></ul><h3><strong>Prioritize</strong></h3><p>For all the software you&#8217;ve inventoried, the prioritize phase is all about figuring out which software is <em>inherently</em> most at risk of having vulnerabilities in it that get exploited by attackers.&nbsp;</p><p>In other words: whether you already have some software being regularly patched or you're starting entirely from scratch, you should focus your efforts on incrementally building new auto-patching workflows for software based on the following vulnerability attributes.&nbsp;</p><ul><li><p><strong>Attack History: </strong>has this software ever appeared on CISA&#8217;s KEV or other &#8220;actively targeted&#8221; vulnerability intel lists? Attack history is a strong signal that a piece of software has been, and likely will continue to be, an attractive target for attackers when conducting real-world attacks.</p></li><li><p><strong>Exploit History: </strong>has this software ever had exploit code or methods published for vulnerabilities associated with it? The existence of publicly known exploit methods doesn't always mean attackers have bothered targeting their vulnerability exploitation efforts at a piece of software; however, it does serve as a good signal of software that is more likely to end up in attackers&#8217; cross-hairs in the future since vulnerabilities with known exploit methods are easier to target than those without them.</p></li><li><p><strong>Vulnerability History: </strong>has this software ever had vulnerabilities published as CVEs, GHSAs, etc? Compared to the other two attributes listed above, this is the weakest prioritization signal to use. However, software with a much longer history of published vulnerabilities seem to have a generally higher likelihood of being targeted by attackers compared to software with less or no vulnerability history (at least, according to my interpretation of the<a href="https://www.first.org/epss/model"> research behind EPSS</a>).</p></li><li><p><strong>Exposure Analysis: </strong>does this software process user-controllable data, and if so, from where? For example: a vulnerability that exists in a software component that processes user-controllable data that is <em>ultimately </em>received from the internet is most exposed (and thus most easily exploited) compared to one that processes machine-produced data from a local file system.</p></li></ul><h3><strong>Patch</strong></h3><p>This is where all of the fun happens. This phase is intended all about frequently checking for new security updates and applying them as soon as they&#8217;re available.&nbsp;</p><ul><li><p><strong>Create Tests: </strong>in my experience, patch testing is one of the least rigorous and most underdeveloped aspects of patch management. Raise your hand if your organization&#8217;s approach to patch testing for things like end user devices is &#8220;roll out patches to 5% of users and wait to see if anyone files any tickets about BSODs / kernel panics.&#8221; Compared to modern approaches to <a href="https://en.wikipedia.org/wiki/Software_testing">software testing</a> (unit testing, regression testing, <a href="https://about.codecov.io/">test coverage metrics</a>, etc.), testing in the context of patch management is generally immature - but it doesn&#8217;t have to be! We can apply these same modern software testing paradigms to patch management to ensure we are rigorously, and automatically, vetting the success of a newly installed patch before deploying it to the masses.</p></li><li><p><strong>Run Tests: </strong>once you&#8217;ve created your (automated) tests for your the software you&#8217;re creating an auto-patch workflow for, it&#8217;s time to&#8230;well, test your tests! Make sure they&#8217;re successfully detecting evidence of bad patches.</p></li><li><p><strong>Deploy Auto-Patch:&nbsp; </strong>once your patch tests pass, it&#8217;s time to #shipit. If you&#8217;re patching a large fleet of similar assets (e.g. end user computers, production compute servers/containers), use <a href="https://learn.microsoft.com/en-us/windows/deployment/update/create-deployment-plan">deployment rings</a> and <a href="https://sre.google/workbook/canarying-releases/">canaries</a> to incorporate quality control mechanisms and feedback loops for detecting bad patches that your tests may have missed. When patching-related issues are detected or suspected, halt and, if possible, rollback patches.</p></li></ul><p>I suspect that the &#8220;Inventory&#8221; phase and &#8220;Patch&#8221; phase are pretty straightforward for most folks, but the &#8220;Prioritize&#8221; phase might be more obscure. To better clarify what the &#8220;Prioritize&#8221; phase entails, I&#8217;d like to introduce a patching prioritization decision making model called&#8230;</p><h2><strong>Stakeholder-Specific Patching Prioritization (SSPP)</strong></h2><p>Sorry, I had to! There&#8217;s been enough innovation in the realm of four-letter acronyms for vulnerability management concepts that I&#8217;m going to shamelessly copy SSVC for naming this next framework as SSPP. For all of my software development friends out there who seize every opportunity to <a href="https://youtu.be/_K-L9uhsBLM?t=65">optimize and compress information</a>, you may simply refer to this as <code>s2p</code> (just kidding, please don&#8217;t).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!18EB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!18EB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png 424w, https://substackcdn.com/image/fetch/$s_!18EB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png 848w, https://substackcdn.com/image/fetch/$s_!18EB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png 1272w, https://substackcdn.com/image/fetch/$s_!18EB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!18EB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png" width="728" height="244.5" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:489,&quot;width&quot;:1456,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:305025,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!18EB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png 424w, https://substackcdn.com/image/fetch/$s_!18EB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png 848w, https://substackcdn.com/image/fetch/$s_!18EB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png 1272w, https://substackcdn.com/image/fetch/$s_!18EB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb55668e4-6f24-49c9-a8be-c91ad11fc3b2_3456x1160.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption"><em>SSPP decision tree for determining if, and when, to create auto-patching workflows for a piece of software that doesn&#8217;t already have one</em></figcaption></figure></div><p>The crux of this framework is to drive focus around which software to build auto-patching workflows for and in what order. The intent is that once you've created a reliable auto-patching process for a piece of software, <strong>it will ensure that the latest security updates for a piece of software are </strong><em><strong>proactively </strong></em><strong>installed soon after they're made available.</strong></p><p>Unlike SSVC, the decision points in this model are intended to be as simple as possible (but no simpler) to facilitate efficient yet still effective prioritization of creating auto-patching workflows. There is still room for additional prioritization criteria to help deal with &#8220;tie breaker&#8221; scenarios (e.g. &#8220;I&#8217;ve got 100 pieces of software that fall into the P1 category - which of <em>those</em> should I focus on first?&#8221;).&nbsp;</p><p>Here&#8217;s an example prioritization matrix based on these attributes. If you&#8217;re starting from scratch and you don&#8217;t have any auto-patching workflows created, this model is intended to guide your focus in choosing which software to create auto-patching workflows for before others.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cU57!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cU57!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png 424w, https://substackcdn.com/image/fetch/$s_!cU57!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png 848w, https://substackcdn.com/image/fetch/$s_!cU57!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png 1272w, https://substackcdn.com/image/fetch/$s_!cU57!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cU57!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png" width="1456" height="1608" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1608,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:385629,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cU57!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png 424w, https://substackcdn.com/image/fetch/$s_!cU57!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png 848w, https://substackcdn.com/image/fetch/$s_!cU57!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png 1272w, https://substackcdn.com/image/fetch/$s_!cU57!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb48c706-0773-4b7f-8048-2090f081913d_1568x1732.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h3><strong>Attack History Analysis Example</strong></h3><p>Let&#8217;s step through an example to see how finer-grained prioritization criteria at the &#8220;Attack History Analysis&#8221; stage helps with providing a risk-based approach for building auto-patching workflows. Again, the idea behind PVPM and SSPP is that all of this analysis and decision making <em>needs</em> to be automated for it to scale efficiently and effectively.</p><p>Let&#8217;s assume for a moment that&nbsp;</p><ul><li><p>Our organization has <em>every</em> software product actively in use that is mentioned in CISA&#8217;s KEV list (see this <a href="https://docs.google.com/spreadsheets/d/1bBo9CpNmcWUS1JuCPcoa_dezsvYUxZjaLaB7-7oi7Zc/edit#gid=1069127883">snapshot</a> of data I set aside for this example).&nbsp;</p></li><li><p>We don&#8217;t have auto-patching in place for any of them</p></li></ul><p>When examining this data in the aggregate, we can quickly see which software product to focus our auto-patching efforts on first, second, third, etc.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Vysc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Vysc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png 424w, https://substackcdn.com/image/fetch/$s_!Vysc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png 848w, https://substackcdn.com/image/fetch/$s_!Vysc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png 1272w, https://substackcdn.com/image/fetch/$s_!Vysc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Vysc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png" width="525" height="631.8217665615142" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1526,&quot;width&quot;:1268,&quot;resizeWidth&quot;:525,&quot;bytes&quot;:309140,&quot;alt&quot;:&quot;&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="" srcset="https://substackcdn.com/image/fetch/$s_!Vysc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png 424w, https://substackcdn.com/image/fetch/$s_!Vysc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png 848w, https://substackcdn.com/image/fetch/$s_!Vysc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png 1272w, https://substackcdn.com/image/fetch/$s_!Vysc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe4a3f3a0-fea6-4ae0-8f53-0d7f554416f5_1268x1526.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Overview of aggregated CISA KEV data</figcaption></figure></div><p>Thankfully, software products like Windows, iOS, macOS, and Chrome have reliable built-in auto-patching mechanisms that we can enable to implement some <em>basic</em> auto-patching in our environment. Also, security patches for these products tend to be very stable, so we can safely skip implementing rigorous patch testing for them (for now).</p><p>But what about Cisco IOS, Oracle WebLogic, and Apache Struts? Auto-patching these components is unfamiliar, and even scary, territory for us. However, that fear shouldn&#8217;t stop us from defining and implementing a rigorous and automated patch testing and deployment process for them. Now that we&#8217;ve implemented basic built-in auto-patching for the other higher risk software in my environment, we&#8217;ve bought ourselves more time to focus on creating and rolling out rigorous auto-patching for these trickier-to-patch systems.</p><p>Proactively building out auto-patching workflows for these trickier-to-patch systems puts us in a much stronger position to engage in emergency patching in the event a new actively exploited vulnerability is discovered in the wild for them. Rather than engaging in a panicked, rushed, and error-prone <em>reactive</em> &#8220;emergency&#8221; vulnerability patching process, we can trigger our auto-patching workflow on demand to confidently and quickly beat attackers to the punch.</p><h1><strong>Concluding Thoughts</strong></h1><p>While I <em>personally</em> think these proactive vulnerability management ideas could transform the state of vulnerability management for many organizations, I also know that I&#8217;m only one person with a limited set of experience and perspectives. Before writing further on this topic, I&#8217;m hoping to get feedback from and spur a discussion within the InfoSec community about these ideas.&nbsp;</p><p>What aspects of these ideas make sense? What doesn&#8217;t make sense? How could they be improved upon?&nbsp;</p><p>I&#8217;d really love to hear feedback from folks about this!</p><p>Thanks for reading :)</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thank you for reading Sensible Security. This post is public so feel free to share it.</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://sensiblesecurity.xyz/p/are-we-doing-vulnerability-management?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div>]]></content:encoded></item><item><title><![CDATA[Protecting against a password manager breach: part 2]]></title><description><![CDATA[A recipe for keeping your online accounts safe]]></description><link>https://sensiblesecurity.xyz/p/protecting-against-a-password-manager-8f6</link><guid isPermaLink="false">https://sensiblesecurity.xyz/p/protecting-against-a-password-manager-8f6</guid><dc:creator><![CDATA[Justin Pagano]]></dc:creator><pubDate>Fri, 23 Dec 2022 13:32:57 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In part 1 of <em><a href="https://justinpagano.substack.com/p/protecting-against-a-password-manager">Protecting against a password manager breach</a></em>, in light of LastPass&#8217; recent back-to-back security incidents (i.e. one long drawn out <a href="https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/#:~:text=Update%20as%20of%20Thursday%2C%20December%2022%2C%202022%C2%A0%C2%A0">incident</a>), I provided an overview of how password managers could be <a href="https://www.darkreading.com/attacks-breaches/password-manager-suffers-supply-chain-attack">successfully breached</a> and what users of password managers can do to protect themselves against such a breach. In this context, a successful password manager breach means <em>decrypted</em> data from a password manager is obtained by a malicious actor.</p><p>Let&#8217;s dive a bit deeper into how best to combine and use these <a href="https://justinpagano.substack.com/i/90282736/ingredients-for-a-hardened-password-manager-recipe">ingredients</a> for hardening your online accounts in the event your password manager (or really any of your passwords in general) gets breached.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="1080" height="608" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:608,&quot;width&quot;:1080,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1661160094555-a798a7df499f?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwxMHx8ZGlnaXRhbCUyMHB1enpsZXxlbnwwfHx8fDE2NzE3NjY4ODM&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@ilgmyzin">ilgmyzin</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><h2><strong>Harden your password manager and online accounts&nbsp;</strong></h2><p>Here&#8217;s a summarized checklist of steps you can start taking to harden your password manager and online accounts. I&#8217;ve also ported this over to <a href="https://github.com/p4gs/online-account-and-password-manager-hardening-guide/blob/main/README.md">GitHub in an actual checklist format</a> and also to encourage folks to submit pull requests for additional ideas or edits.&nbsp;</p><p><em>NOTE: As mentioned in <a href="https://justinpagano.substack.com/i/90282736/ingredients-for-a-hardened-password-manager-recipe">part 1</a>, for the sake of simplicity and security, this guide assumes you&#8217;re only using Apple devices. I'm also assuming you&#8217;re using 1Password, BitWarden, Authy, and 2 YubiKeys.</em></p><h3><strong>Securely setup 1Password</strong></h3><blockquote><p><em>Setup 1Password for creating and storing passwords and password equivalents, such as security question answers. Especially in light of LastPass&#8217; latest incident update, 1Password&#8217;s <a href="https://support.1password.com/secret-key-security/#how-your-secret-key-protects-you">Secret Key</a> feature, which is built-in at the moment of account creation, guarantees universal protection against offline brute force attacks.</em></p></blockquote><ul><li><p>Use a unique <a href="https://diceware.rempe.us/#eff">passphrase</a> for logging into 1Password</p></li><li><p>Setup <a href="https://support.1password.com/security-key/">MFA with YubiKeys only</a></p></li><li><p>Store your 1Password passphrase in a secure place (<a href="https://www.nytimes.com/wirecutter/reviews/best-fireproof-document-safe/">fireproof safe</a> = better security, Apple Keychain = better usability)</p><ul><li><p>Your 1Password Secret Key can be stored in the same place since <a href="https://support.1password.com/secret-key-security/#how-your-secret-key-protects-you">it's designed to be</a> an entropy-boosting addition to your password</p></li></ul></li></ul><h3><strong>Harden foundational accounts</strong></h3><blockquote><p><em>These are accounts that, if compromised, could be used to reset account passwords or access Passkeys.</em></p></blockquote><ul><li><p>Ensure email account has a strong password and MFA setup with YubiKeys</p><ul><li><p>Use Gmail (Google&#8217;s security is top notch). If you're extra paranoid, use Protonmail</p></li></ul></li><li><p>Ensure Apple ID has strong password and MFA setup with YubiKeys</p></li></ul><h3><strong>Protect against SMS MFA code theft</strong></h3><blockquote><p><em>Some of your accounts may still only support SMS MFA codes (and any form of MFA is better than no MFA). Similarly, some sites and apps, such as Authy, use mobile phone numbers for account creation. Hardening your mobile phone number and account is essential in these contexts.</em></p></blockquote><ul><li><p>Create a strong password for your mobile carrier online account</p></li><li><p>Setup MFA on your mobile carrier online account</p></li><li><p>Setup a mobile carrier PIN to protect against <a href="https://www.verizon.com/about/account-security/sim-swapping">SIM hijacking</a><strong> </strong>(<a href="https://www.verizon.com/support/account-pin-faqs/">Verizon</a>, <a href="https://www.t-mobile.com/support/account/update-your-customer-pinpasscode">T-Mobile</a>, <a href="https://www.att.com/support/article/wireless/KM1051385">AT&amp;T</a>, <a href="https://www.sprint.com/en/support/solutions/account-and-billing/learn-more-about-your-account-pin.html">Sprint</a>, <a href="https://www.cricketwireless.com/support/protect-my-phone/account-pin-security.html">Cricket</a>)</p></li><li><p>Setup Google Voice number to be used for SMS MFA (you can disassociate it from your mobile phone number later on for added security)</p><ul><li><p>Ensure Google Account has strong password and YubiKey-only MFA enabled</p></li></ul></li></ul><h3><strong>Securely setup Authy</strong></h3><blockquote><p><em>Use Authy whenever time-based one-time passcode (TOTP aka &#8220;Google Authenticator&#8221;) MFA is the most secure option available. If you&#8217;re extra paranoid and are willing to make some usability sacrifices, try storing your MFA codes in a YubiKey and use <a href="https://www.yubico.com/products/yubico-authenticator/">Yubico Authenticator</a> to access them.</em></p></blockquote><ul><li><p>Setup Authy using your Google Voice number</p></li><li><p>Enable <a href="https://support.authy.com/hc/en-us/articles/115001750008-Backups-and-Sync-in-Authy">Authy Backups</a> and create/store a randomly generated Backup Password with 1Password</p></li><li><p>Disable <a href="https://support.authy.com/hc/en-us/articles/360016317013-Enable-or-Disable-Authy-Multi-Device">Authy Multi-Device</a> access and only re-enable when you're setting up Authy on another device</p><ul><li><p>If you are able to, install Authy on at least two devices so you don't have to go through a painful account recovery process if your only Authy-installed device breaks, is lost, etc.</p></li><li><p>If you&#8217;re extra paranoid and are willing to make some usability sacrifices, try storing your MFA codes in a YubiKey and use <a href="https://www.yubico.com/products/yubico-authenticator/">Yubico Authenticator</a> to access them</p></li></ul></li></ul><h3><strong>Securely setup BitWarden</strong></h3><blockquote><p><em>Setup BitWarden for storing TOTP MFA recovery codes and MFA recovery code equivalents such as seed keys.</em></p></blockquote><ul><li><p>Setup a BitWarden account using an email address from a different provider</p><ul><li><p>E.g. if you used Gmail for your 1Password account and other accounts, use Protonmail for your BitWarden account</p></li></ul></li><li><p>Use a unique <a href="https://diceware.rempe.us/#eff">passphrase</a> for logging into BitWarden</p><ul><li><p>Store your BitWarden passphrase in a secure place (fireproof safe = better security, Apple Keychain = better usability) but<strong> not</strong> in your 1Password vault</p></li></ul></li><li><p>If you're already paying for BitWarden, setup MFA with YubiKeys only. Otherwise, setup TOTP MFA codes using Authy</p></li></ul><h3><strong>Enable MFA everywhere you can</strong></h3><blockquote><p><em>Don&#8217;t delay, enable MFA today! This is essential for protecting your accounts in the event their passwords are compromised.</em></p></blockquote><ul><li><p>Use <a href="https://support.1password.com/watchtower/#identify-logins-that-support-two-factor-authentication">1Password Watchtower</a> to identify accounts that support MFA and ensure MFA is setup on all of&nbsp; them</p></li><li><p>Explore <a href="https://2fa.directory">2fa.directory</a> to identify additional accounts that support MFA and ensure MFA is setup on all of them</p></li></ul><h3><strong>Change compromised and vulnerable passwords</strong></h3><ul><li><p>Use <a href="https://support.1password.com/watchtower/#find-compromised-websites-and-vulnerable-passwords">1Password Watchtower</a> to identify passwords of yours that have been caught up in past data breaches</p></li><li><p>Change each compromised or vulnerable password</p></li></ul><h3><strong>Change weak and reused passwords</strong></h3><ul><li><p>Use <a href="https://support.1password.com/watchtower/#find-compromised-websites-and-vulnerable-passwords">1Password Watchtower</a> to identify weak and reused passwords of yours</p></li><li><p>Change each weak or reused password</p></li><li><p>Replace passwords with Passkeys (WebAuthN) <a href="https://passkeys.directory">where possible</a>&nbsp;</p></li></ul><h3><strong>Detect account compromises as they happen</strong></h3><ul><li><p>Setup email rules for new device login, suspicious login, password reset, and MFA change notifications</p><div class="image-gallery-embed" data-attrs="{&quot;gallery&quot;:{&quot;images&quot;:[{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/d7b428d9-945a-44af-8513-a10f9ea7327a_1232x1478.png&quot;},{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/1f8a275b-a3ca-45c9-9448-66439139e131_1064x1204.png&quot;}],&quot;caption&quot;:&quot;Examples of email notifications about logins from new devices, changes to MFA, etc.&quot;,&quot;alt&quot;:&quot;Examples of email notifications about logins from new devices, changes to MFA, etc.&quot;,&quot;staticGalleryImage&quot;:{&quot;type&quot;:&quot;image/png&quot;,&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/9025b11a-7345-4608-9328-6b208da38c3e_1456x720.png&quot;}},&quot;isEditorNode&quot;:true}"></div></li><li><p>Start treating rogue SMS MFA codes and push notification MFA prompts with suspicion, changing passwords when benign cause of rogue codes/prompts can't be identified&nbsp;</p><ul><li><p><em>Especially</em> if you receive a message from someone who claims to need your MFA codes or for you to approve push notifications. If this happens, change passwords and report to your account provider ASAP</p></li></ul></li></ul><p>That&#8217;s it for now. When all is said and done, this is what your password manager and online account security &#8220;architecture&#8221; will look like:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XpOc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XpOc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!XpOc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!XpOc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!XpOc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XpOc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png" width="960" height="540" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/ed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:80817,&quot;alt&quot;:&quot;High-level overview of a hardened password manager and online account setup&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="High-level overview of a hardened password manager and online account setup" title="High-level overview of a hardened password manager and online account setup" srcset="https://substackcdn.com/image/fetch/$s_!XpOc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!XpOc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!XpOc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!XpOc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fed60ebb3-d28f-47f8-9e11-72b72d1a98cc_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">High-level overview of a hardened password manager and online account setup</figcaption></figure></div><p>Stay tuned for part 3 of this series where I&#8217;ll cover how password manager <em>developers</em> can secure their software development lifecycle (SDLC) and cloud infrastructure to protect their customers.</p>]]></content:encoded></item><item><title><![CDATA[Protecting against a password manager breach: part 1]]></title><description><![CDATA[Prepare for the inevitable to avoid digital disaster]]></description><link>https://sensiblesecurity.xyz/p/protecting-against-a-password-manager</link><guid isPermaLink="false">https://sensiblesecurity.xyz/p/protecting-against-a-password-manager</guid><dc:creator><![CDATA[Justin Pagano]]></dc:creator><pubDate>Tue, 13 Dec 2022 02:34:08 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>In light of the <a href="https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/#:~:text=Original%20post%20from%20August%2025%2C%202022%C2%A0%C2%A0">recent</a> <a href="https://blog.lastpass.com/2022/11/notice-of-recent-security-incident/#:~:text=Update%20as%20of%20Wednesday%2C%20November%2030%2C%202022">breaches</a> of LastPass&#8217; infrastructure systems, I've been thinking: what would happen if the data in my password manager <em>were</em> successfully breached? And what can I do right now to reduce the impact of such a breach?</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080" width="728" height="455" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:675,&quot;width&quot;:1080,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Photo of 1Password's macOS desktop app&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Photo of 1Password's macOS desktop app" title="Photo of 1Password's macOS desktop app" srcset="https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1652508682936-f76c04760e5d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwzMDAzMzh8MHwxfHNlYXJjaHwyNHx8cGFzc3dvcmR8ZW58MHx8fHwxNjcwODk5MTQ2&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo of 1Password's macOS desktop app by <a href="https://unsplash.com/@entrpswn">Volodymyr Kondriianenko</a></figcaption></figure></div><p>I strongly believe everyone should use a password manager given how easy they make it to protect against <a href="https://attack.mitre.org/techniques/T1110/004/">credential</a> <a href="https://attack.mitre.org/techniques/T1552/">theft</a> <a href="https://bitwarden.com/blog/how-password-managers-help-prevent-phishing/">attacks</a>. Being able to automatically generate and fill unique unguessable passwords for every account is the primary benefit most people are familiar with, but modern password managers are chock full of fancy features: helping developers keep <a href="https://developer.1password.com/docs/vscode/">plaintext secrets out of code files and environment variables</a> and notifying you when one of your accounts is <a href="https://watchtower.1password.com/">detected in a data breach</a> are two notable examples.</p><p>While the best password managers employ <a href="https://www.lastpass.com/security/zero-knowledge-security">strong</a> <a href="https://bitwarden.com/help/bitwarden-security-white-paper/">security</a> <a href="https://1passwordstatic.com/files/security/1password-white-paper.pdf">measures</a>, they can only make it harder, not impossible, for attackers to steal your data (granted, they make it <em>very</em> hard for attackers to steal your data).&nbsp;</p><p>The most concerning aspects of LastPass&#8217; recent incidents were that</p><ul><li><p>a developer&#8217;s account was compromised</p></li><li><p>a third-party cloud storage system was accessed</p></li></ul><p>In either case, this could have allowed the attacker to inject malicious code into LastPass&#8217; client-side components, such as front end UI code, web browser extensions, and desktop/mobile apps. This is a viable attack path that can result in an attacker stealing <strong>decrypted</strong> user data for many, if not all of, LastPass&#8217; customers.&nbsp;</p><p>This isn&#8217;t some contrived hypothetical attack scenario, either: <a href="https://www.darkreading.com/attacks-breaches/password-manager-suffers-supply-chain-attack">software supply chain attacks</a> have been on the rise in <a href="https://about.codecov.io/security-update/">recent years</a>, especially since <a href="https://www.microsoft.com/security/blog/2020/12/18/analyzing-solorigate-the-compromised-dll-file-that-started-a-sophisticated-cyberattack-and-how-microsoft-defender-helps-protect/">SolarWinds suffered one</a> in 2020. This also <a href="https://www.helpnetsecurity.com/2019/02/20/flawed-password-managers-allow-malware-to-steal-passwords-from-computer-memory/">isn&#8217;t the only way</a> an attacker could breach your password manager.</p><p>Freaked out yet? Yeah, me too. But don't fret! Let&#8217;s take a deep breath and explore all the ways you can protect your accounts even if your password manager is breached.</p><h1><strong>Driving principles for a hardened password manager setup</strong></h1><p>Reducing the impact of a password manager breach relies on two core principles:</p><ol><li><p>Multi-factor authentication (MFA) needs to be enabled for all sites and apps <a href="https://2fa.directory/int">that support it</a>&nbsp;</p></li><li><p>Passwords and password equivalents, such as <a href="https://blog.1password.com/orange-facile-glossary-and-other-questions-answered/">security questions</a>, must be stored separately from MFA codes and MFA code equivalents, such as seed keys and recovery codes</p></li></ol><p>In practice, these principles imply a few things: you'll need one app for storing passwords, a second app for actively using MFA <a href="https://www.onelogin.com/learn/otp-totp-hotp#:~:text=that%20uses%20HOTP.-,What%20is%20TOTP%3F,-Time%2Dbased%20One">one-time passcodes (OTPs)</a>, and a third app for storing MFA recovery codes. This ensures that if an attacker successfully compromises your primary password manager, they <em>also</em> need to carry out a separate attack against your secondary password manager app. The harder you make it for attackers to gain access to your online accounts, the more likely they&#8217;ll give up and focus on easier targets.</p><h1><strong>Ingredients for a hardened password manager &#8220;recipe&#8221;</strong></h1><p>Once you&#8217;ve implemented all the guidance outlined below, you&#8217;ll have a hardened and resilient password manager setup that resembles something like this:</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mKa1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mKa1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!mKa1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!mKa1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!mKa1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mKa1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png" width="728" height="409.5" data-attrs="{&quot;src&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/af77f864-3e88-43ee-9a20-759c4f128cab_960x540.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;normal&quot;,&quot;height&quot;:540,&quot;width&quot;:960,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:80817,&quot;alt&quot;:&quot;High-level architecture diagram of a hardened password manager setup, including Apple devices (iPhone, iPad, Mac), 1Password, Authy, BitWarden, and more&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="High-level architecture diagram of a hardened password manager setup, including Apple devices (iPhone, iPad, Mac), 1Password, Authy, BitWarden, and more" title="High-level architecture diagram of a hardened password manager setup, including Apple devices (iPhone, iPad, Mac), 1Password, Authy, BitWarden, and more" srcset="https://substackcdn.com/image/fetch/$s_!mKa1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png 424w, https://substackcdn.com/image/fetch/$s_!mKa1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png 848w, https://substackcdn.com/image/fetch/$s_!mKa1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png 1272w, https://substackcdn.com/image/fetch/$s_!mKa1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Faf77f864-3e88-43ee-9a20-759c4f128cab_960x540.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">High-level overview of a hardened password manager setup</figcaption></figure></div><p>Try not to strain your eyes too much just yet: we&#8217;ll dive into each ingredient shown above and how they work together to minimize the impact of a password manager breach.</p><p><em>NOTE<strong>: </strong>For the sake of simplicity and security, this guide assumes you&#8217;re only using Apple devices.</em></p><h2><strong>2 password manager apps</strong></h2><p>I recommend <a href="https://1password.com/sign-up/">1Password</a> for storing passwords and password equivalents due to its <a href="https://1password.com/product/features/">rich set of features</a> and excellent user interface.&nbsp;</p><p>I recommend <a href="https://bitwarden.com/pricing/">BitWarden</a> for storing MFA recovery codes and OTP seed keys since it&#8217;s simple enough to use for this use case. While its UI isn&#8217;t as good as 1Password&#8217;s, you shouldn't need to access your MFA recovery codes and seed keys very often.&nbsp;</p><p>Both use <a href="https://1password.com/security/">strong</a> <a href="https://bitwarden.com/help/bitwarden-security-white-paper/">security</a> measures and sync data across all major platforms and device types. You&#8217;ll need to pay for 1Password (it&#8217;s worth it) but can use BitWarden&#8217;s free version for this MFA use case.</p><p><em>NOTE<strong>: </strong>While many web browsers have built-in password managers, they are <a href="https://www.bleepingcomputer.com/news/security/redline-malware-shows-why-passwords-shouldnt-be-saved-in-browsers/">increasingly targeted by attackers</a> and are not as secure as dedicated password managers. Avoid using them.</em></p><h2><strong>1 MFA code app</strong></h2><p>I recommend using <a href="https://authy.com/download/">Authy</a> as your MFA code app (as long as you implement it in specific ways, which we&#8217;ll cover later on). It makes it easy to save, search for, and use MFA codes across your phone and/or tablet. Because computer OSes are at an increased risk of having malware installed on them (especially compared to iOS), be sure to <strong>only</strong> install Authy on a phone or tablet.</p><h2><strong>2 security keys</strong></h2><p>I recommend <a href="https://www.yubico.com/">YubiKeys</a>, as many security practitioners do, for hardware security keys. When &#8220;<a href="https://support.google.com/accounts/answer/6103523?hl=en&amp;co=GENIE.Platform%3DDesktop&amp;oco=0">Security Key</a>&#8221; or &#8220;<a href="https://passkeys.directory/">Passkey</a>&#8221; MFA (i.e. <a href="https://www.yubico.com/resources/glossary/fido-2/">FIDO 2.0</a>, <a href="https://developers.yubico.com/WebAuthn/">WebAuthn</a>, or <a href="https://www.yubico.com/resources/glossary/fido-u2f/">U2F</a>) is available for any of your accounts, you&#8217;ll want to use your YubiKeys as your MFA method. Security Key MFA &#8220;codes&#8221; can&#8217;t be intercepted by or spoofed by a <em>remote </em>attacker thanks to sophisticated encryption patterns established by FIDO 2.0. For maximum security, try <a href="https://www.yubico.com/products/yubikey-bio-series/">YubiKey Bio (FIDO edition)</a> - affordable <em>three</em>-factor authentication for the masses!</p><p><em>NOTE: you&#8217;ll want 2 YubiKeys in case one of them is lost or broken. Keep one on your <a href="https://www.yubico.com/product/pivot2/">keychain</a> and another in a safe place, such as a fireproof safe (see below).</em></p><h2><strong>1 fireproof safe</strong></h2><p>If you&#8217;re extra cautious (i.e. paranoid), you&#8217;ll want to keep a <em>physical</em> copy of your 1Password Secret Key and BitWarden MFA recovery code stored separately from all of your internet-connected devices. That way, if an attacker somehow manages to compromise your 1Password account password <em>and</em> MFA for 1Password, they would have to physically break into your fireproof safe, too.</p><p><em><strong>NOTE: </strong>FIDO 2.0-certified biometric authentication provided by Windows Hello, Touch ID, Face ID, etc. can provide similar authentication security as YubiKeys, but they aren&#8217;t portable and platform agnostic like YubiKeys are. Trade offs are hard!</em></p><p>While stepping through how to stick to this approach, I'm going to assume (and recommend) that you use:</p><ul><li><p><strong>Apple devices</strong>, given their strong hardware platform + OS security architecture combined with ease of use when using features such as TouchID, FaceID, and Keychain for logging into and unlocking your password manager&nbsp;</p></li><li><p><strong>1Password</strong> for storing passwords and password equivalents, given its strong security architecture, additional security features like Watchtower and developer tool integrations, and excellent user interface</p></li><li><p><strong>Authy</strong> as your default MFA code app</p><ul><li><p>If you&#8217;re extra paranoid and are willing to make some usability sacrifices, try storing your MFA codes in a YubiKey and use <a href="https://www.yubico.com/products/yubico-authenticator/">Yubico Authenticator</a> to access them</p></li></ul></li><li><p><strong>BitWarden </strong>(free edition) for storing <a href="https://auth0.com/docs/secure/multi-factor-authentication/configure-recovery-codes-for-mfa#:~:text=A%20recovery%20code%20is%20a,a%20recovery%20code%20to%20authenticate.">MFA recovery codes</a> or seed keys when recovery codes aren't available</p></li></ul><p>That concludes part 1 of this series. Part 2 will cover written guidance on how to combine these ingredients to create a hardened password manager setup as well as password manager best practices to abide by.</p><blockquote><p>UPDATE: <a href="https://justinpagano.substack.com/p/protecting-against-a-password-manager-8f6">Part 2 has been published</a>!</p></blockquote><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sensiblesecurity.xyz/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Justin&#8217;s Thought Leadership LLC Inc.&#8482;! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>