Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » CTEM 101 – Beyond Vulnerability Management with Continuous Threat Exposure Management
    Cyber Security

    CTEM 101 – Beyond Vulnerability Management with Continuous Threat Exposure Management

    techempireBy techempire3 Comments7 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 12, 2024Hacker NewsCTEM/Vulnerability Management

    Vulnerability management

    In a world of ever-expanding terminology, adding another FLA (four-letter abbreviation) to your vocabulary may seem like the last thing you want to do. However, if you are looking for ways to continuously reduce risk across your environment while making significant and ongoing improvements to your security posture, we think you may want to consider establishing a Continuous Threat Exposure Management (CTEM) program.

    CTEM is a cyber risk management approach that combines attack simulation, risk prioritization and remediation guidance in a coordinated process. The term “persistent threat exposure management” first appeared in the Gartner ® report “Implementing a Persistent Threat Exposure Management Program (CTEM)” (Gartner, July 21, 2022). Since then, we’ve seen organizations around the world see the benefits of this integrated, ongoing approach.

    Exposure management platform

    Webinar: Why and How to Adopt the CTEM Framework

    XM Cyber ​​is hosting a webinar on March 27th hosted by Gartner Vice President Analyst Pete Shoard on Adopting the CTEM Framework, and even if you can’t attend, we’ll share an on-demand link so don’t miss it!

    Focus on areas of greatest risk

    But why is CTEM so popular, and more importantly, how does it improve the already overcrowded world of vulnerability management?

    At its core, CTEM is about uncovering real, actionable risks to critical assets. Anyone can identify security improvements in an organization’s environment. The problem is not in discovering risk exposures, but in being overwhelmed by them – and being able to know which risks pose the greatest risk to key assets.

    We believe the CTEM program can help you:

    1. Identify your most exposed assets and how attackers might exploit them
    2. Understand the impact and likelihood of potential breaches
    3. Prioritize the most pressing risks and vulnerabilities
    4. Get actionable advice on how to fix these problems
    5. Continuously monitor your security posture and track your progress

    Through the CTEM program you gain an “attacker’s perspective”, cross-referencing vulnerabilities in your environment and their likelihood of being exploited by an attacker. The result is a prioritized list of exposure issues to address, including issues that can be safely addressed later.

    Five Phases of CTEM Programs

    Vulnerability management

    CTEM is not a specific product or service, but a plan to reduce cybersecurity risks through five phases:

    1. scoping – According to Gartner, “To define and subsequently refine the scope of a CTEM initiative, security teams first need to understand what is important to the business partner and what the impact may be (such as the need to disrupt production systems)” Severe enough to warrant Collaborative Remedies. ”
    2. Discover – Gartner says, “After scoping is complete, it is important to begin the process of discovering the assets and their risk profile. Discovery of business areas that have been identified by the scoping process should be prioritized, although this is not always the driver. Exposure discovery includes more than just vulnerabilities: it This may include misconfiguration of assets and security controls, as well as other vulnerabilities such as counterfeit assets or adverse reactions to phishing tests.”
    3. Priority – Gartner states that at this stage, “the goal of exposure management is not to try to fix every identified issue or the most common zero-day threat, but to identify and address the threats most likely to be exploited against the organization.” Gartner further states, “Organizations cannot handle the traditional way of prioritizing risks through predefined base severity scores because they need to consider vulnerability exploit prevalence, available controls, mitigation options, and business criticality to reflect the impact on risk. potential impact on the organization.
    4. verify – According to Gartner, this phase “is part of the process by which an organization verifies how a potential attacker could actually exploit the identified exposure and how monitoring systems might react.” Gartner also states that the goals of the verification step include verifying that an attacker can Leverage previously discovered and prioritized vulnerabilities to “evaluate possible attack successes.”
    5. mobilization – Gartner states, “To ensure success, security leaders must acknowledge and communicate to all stakeholders that remediation cannot be fully automated.” The report further states, “The goal of ‘mobilization’ efforts is to reduce the number of approvals, implementation processes, and Eases friction in deployment and ensures teams put CTEM results into action. It requires organizations to define communication standards (information requirements) and document cross-standard-team approval workflows.”

    CTEM versus alternative methods

    There are several alternative approaches to understanding and improving the security posture, some of which have been used for decades.

    • Vulnerability Management/RBVM Focus on mitigating risk by identifying vulnerabilities through scanning, then prioritizing and fixing them based on static analysis. Automation is critical given the increasing number of assets that need to be analyzed and the number of vulnerabilities identified. However, RBVM is limited to identifying CVEs and cannot resolve identity issues and misconfigurations. Additionally, it does not have the information needed to properly prioritize fixes, often resulting in widespread backlogs.
    • red team practice It is manual, expensive point-in-time testing of network security defenses. They try to determine whether a successful attack path existed at a specific point in time, but they cannot identify the full risk.
    • Similarly, Penetration testing Use testing methods as a risk assessment and provide point-in-time results. Since it involves active interaction with networks and systems, it is often limited in terms of critical assets due to the risk of disruption.
    • Cloud Security Posture Management (CSPM) Focus solely on misconfiguration issues and compliance risks in cloud environments. While important, it does not account for interactions between remote employees, on-premises assets, or multiple cloud providers. These solutions don’t understand the full path of attack risk across different environments—a common risk in the real world.

    We believe that an approach based on the CTEM program has the following advantages:

    • Cover all assets (cloud, on-premises, and remote) and understand which assets are most critical.
    • Continuously discover all types of exposures – traditional CVE, identity and misconfiguration.
    • Presenting real-world insights from the attacker’s perspective
    • Prioritize repair efforts to eliminate paths with the fewest repairs
    • Provide remediation recommendations to achieve reliable, repeatable improvements

    The value of CTEM

    We believe that CTEM methods have significant advantages over other methods, some of which have been used for decades. Essentially, organizations spend years identifying risks, adding them to never-ending “to-do” lists, and spend countless hours hunkering down on those lists with no discernible benefit. With CTEM, a more thoughtful approach to discovery and prioritization adds value through:

    • Quickly reduce overall risk
    • Increase the value of each fix and potentially free up resources
    • Improve coordination between security and IT teams
    • Provide a common perspective on the entire process, encourage a positive feedback loop, and drive continuous improvement

    Getting Started with CTEM

    Because CTEM is a process rather than a specific service or software solution, getting started is a holistic endeavor. Organizational support is a critical first step. Other considerations include:

    • Use the right software components to support processes and data collection
    • Define critical assets and update remediation workflows
    • Perform proper system integration
    • Determine appropriate execution reporting and security posture improvement methods

    We believe that through CTEM programs, organizations can develop a common language of security and IT risk; and ensure that the level of risk for each exposure becomes clear. This allows the few that actually pose a risk out of the thousands of risks that exist to be addressed in a meaningful and measurable way.

    For more information on how to get started with a CTEM program, check out XM Cyber’s white paper, XM Cyber ​​Operations Gartner®’s Continuous Threat Exposure Management (CTEM) Framework.

    Vulnerability management

    Did you find this article interesting? This article is a contribution from one of our valued partners. follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.