Most organizations have external assets that are necessarily exposed—not only to customers and users but also, unfortunately, to malicious actors. Lumu Discover provides insights into vulnerabilities within your external surface. However, addressing those vulnerabilities requires action. In this playbook, we will explore the steps you can take to remediate your network’s vulnerabilities and enhance your cybersecurity posture.
This playbook is based on the Computer Security Incident Handling Guide by the National Institute of Standards and Technology (NIST). According to NIST special publication 800-61 R2, the incident response life cycle has four main phases, as described in the following illustration.
Preparation
This section outlines the essential steps to proactively prepare for responding to and addressing vulnerabilities as they are detected. These measures ensure that the organization is well-equipped to efficiently identify, evaluate, and remediate vulnerabilities.
How Lumu Helps:
- Lumu Discover helps you identify exposed public IPs, services, and domains, along with any associated vulnerabilities. This way, you can choose which assets to protect, thus protecting your whole organization.
- Lumu not only detects existing vulnerabilities, its continuous monitoring detects emerging vulnerabilities and variations in exposure as well. This way, you can remain informed about the current status of your exposed assets.
Recommended Actions:
Detection & Analysis
During this stage, you must make good use of the groundwork laid during the preparation stage, and focus on identifying vulnerabilities and assessing their severity.
How Lumu Helps:
- Lumu Discover delivers a comprehensive list of open ports, exposed services, and associated vulnerabilities. This intelligence enables you to concentrate your efforts on securing the most vulnerable assets effectively.
- Lumu Discover not only identifies vulnerabilities in your network but also provides real-world exploit evidence, giving you the confidence to take informed and decisive action.
Recommended Actions:
Conduct Regular Scans:
- Use Lumu Discover's detailed intelligence to identify vulnerabilities in public-facing infrastructure.
- Cross-reference any obtained findings with available and trust-worthy vulnerability databases (e.g., CVE, CVSS).
Prioritize Risks:
- Organize and categorize vulnerabilities based on exploitability, asset criticality, and adversarial activity detected by Lumu. This will allow you to prioritize critical threats and better protect your network.
- Focus on high-severity vulnerabilities in systems connected to sensitive data or operations. By mapping out your network you will be able to prioritize exposed assets with a direct pathway to your vital infrastructure.
Containment, Eradication & Recovery
During this stage, you must focus on mitigating risks from any identified vulnerabilities, as well as restoring any affected operations securely.
How Lumu Helps:
- Lumu Discover offers insights into which vulnerabilities can be most easily exploited by adversaries targeting your infrastructure. You can use those insights to point those vulnerabilities precisely, correct them, and contain the spread of any attackers attempting to use said vulnerability to harm your organization.
Recommended Actions:
Containment:
- Apply temporary controls such as firewall rules, network segmentation, or access restrictions to limit exposure while the vulnerability is definitively addressed.
- Disable any services or features connected to any assets where high-risk vulnerabilities have been detected, especially if a patch for said vulnerability isn’t available yet.
Eradication:
- Patch any and all affected systems using vendor-recommended updates. This should improve the defense capabilities of your assets.
- If a security patch isn’t available yet, implement recommended mitigations that fit your necessities and conditions (e.g., disabling functionality, applying configuration changes).
- Remove any unnecessary or unused services to reduce the attack surface. This will allow you to focus your efforts and attention.
Recovery:
- Validate that the remediation has been carried out successfully through post-remediation scans.
- Test the stability of critical systems after all the patching and mitigation procedures are completed. Consider doing red-team exercises to make sure that the vulnerabilities have been completely addressed.
Post-Incident Activity
Make the best out of what was learned while handling a potential crisis. Focus on improving vulnerability management practices and preventing future incidents.
How Lumu Helps:
- Lumu will keep continuously scanning and monitoring your network and looking for new vulnerabilities in your external attack surface.
Recommended Actions: