A security assessment tool can determine computer assets in a network and provide an overall security score for the network. The overall security score can represent an objective measure of the security of the network that considers potential security threats to the computer assets, counter measures deployed in the network to address the potential security threats, and the effectiveness of the counter measures. Based on the overall security assessment, the security assessment tool can provide recommendations for improving the security of the network.
|
1. A computer-implemented method for determining an objective security assessment for a network, the method comprising:
determining computer assets in the network;
determining an actual deployment of counter measures associated with the network, wherein the counter measures address potential security threats to the network;
determining, by a processor, an overall security score for the network based at least in part on the actual deployment of the counter measures and an effectiveness of the counter measures;
determining at least one recommendation for improving the overall security score; and
outputting the at least one recommendation and the overall security score,
wherein the overall security score comprises a security score of each of the counter measures associated with the computer assets, the security score of each of the counter measures being based at least in part on an actual effectiveness score that represents the actual deployment of each of the counter measures and a possible effectiveness score that represents a possible deployment of each of the counter measures, and
wherein outputting the at least one recommendation and the overall security score further comprises outputting the security score of each of the counter measures deployed on the computer assets.
27. A non-transitory computer readable storage medium comprising instructions for causing one or more processors to perform a method for determining an objective security assessment for a network, the method comprising:
determining computer assets in the network;
determining, by a security assessment tool, an actual deployment of counter measures associated with the network, wherein the counter measures address potential security threats to the network;
determining, by a processor, an overall security score for the network based at least in part on the actual deployment of the counter measures and an effectiveness of the counter measures;
determining at least one recommendation for improving the overall security score; and
outputting the at least one recommendation and the overall security score,
wherein the overall security score comprises a security score of each of the counter measures associated with the computer assets, the security score of each of the counter measures being based at least in part on an actual effectiveness score that represents the actual deployment of each of the counter measures and a possible effectiveness score that represents a possible deployment of each of the counter measures, and
wherein outputting the at least one recommendation and the overall security score further comprises outputting the security score of each of the counter measures deployed on the computer assets.
14. A system for determining an objective security assessment, the system comprising:
a network interface to a network of computer assets;
one or more memory device storing instructions; and
one or more processors coupled to the network interface and the one or more memory devices, the one or more processors being configured to execute the instructions to perform a method comprising:
determining computer assets in the network;
determining an actual deployment of counter measures associated with the network, wherein the counter measures address potential security threats to the network;
determining an overall security score for the network based at least in part on the actual deployment of the counter measures and an effectiveness of the counter measures;
determining at least one recommendation for improving the overall security score; and
outputting the at least one recommendation and the overall security score,
wherein the overall security score comprises a security score of each of the counter measures associated with the computer assets, the security score of each of the counter measures being based at least in part on an actual effectiveness score that represents the actual deployment of each of the counter measures and a possible effectiveness score that represents a possible deployment of each of the counter measures, and
wherein outputting the at least one recommendation and the overall security score further comprises outputting the security score of each of the counter measures deployed on the computer assets.
2. The computer-implemented method of
determining, at a later time, a change in the actual deployment of the counter measures; and
determining a new overall security score for the network based at least in part on the change in the actual deployment and the effectiveness of the counter measures.
3. The computer-implemented method of
outputting the new overall security score;
outputting a change in the new overall security score relative to the overall security score; and
outputting at least one new recommendation for improving the overall security score.
4. The computer-implemented method of
5. The computer-implemented method of
scanning the network for one or more of the computer assets; and
receiving, via an interface, an identification of one or more of the computer assets.
6. The computer-implemented method of
determining security information of the computer assets, wherein the security information comprises at least one of identification of security software installed on the computer assets, vulnerabilities on the computer assets, system settings of the computer assets, security settings of the computer assets, configuration policies of the computer assets, security policies of the computer assets, access information for the computer assets, details of software installed on the computer assets, and a comparison of the access information and the security setting for the computer assets;
determining, based at least in part on the security information, at least one of the counter measures associated with the network; and
determining, based at least in part on the security information, a coverage of the at least one of the counter measures within the network.
7. The computer-implemented method of
receiving, via an interface, a portion of the security information from a user; and
automatically discovering a portion of the security information.
8. The computer-implemented method of
empirical testing of counter measures versus actual security threats; survey of security experts including commonly understood best practices; and results of findings by security research organizations.
9. The computer-implemented method of
10. The computer-implemented method of
receiving, via an interface, a selection of the at least one recommendation; and
outputting instructions for implementing the at least one recommendation.
11. The computer-implemented method of
determining an amount that each of the potential security threats contributes to the overall security score;
ranking each of the potential security threats based at least in part on one of the frequency of the threat in empirical testing, the potential impact of the threat, or likelihood of the threat succeeding to determine the amount that each of the potential security threats contributes to the overall security score; and
outputting the potential security threats ordered according to the ranking.
12. The computer-implemented method of
receiving, via an interface, at least one of the potential security threats that is a priority;
re-ranking each of the potential security threats based at least in part on the at least one of the potential security threats being a priority; and
outputting the potential security threats ordered according to the re-ranking.
13. The computer-implemented method of
15. The system of
determining, at a later time, a change in the actual deployment of the counter measures; and
determining a new overall security score for the network based at least in part on the change in the actual deployment and the effectiveness of the counter measures.
16. The system of
outputting the new overall security score;
outputting a change in the new overall security score relative to the overall security score; and
outputting at least one new recommendation for improving the overall security score.
17. The system of
18. The system of
scanning the network for one or more of the computer assets; and
receiving, via an interface, an identification of one or more of the computer assets.
19. The system of
determining security information of the computer assets, wherein the security information comprises at least one of identification of security software installed on the computer assets, vulnerabilities on the computer assets, system settings of the computer assets, security settings of the computer assets, configuration policies of the computer assets, security policies of the computer assets, access information for the computer assets, details of software installed on the computer assets, and a comparison of the access information and the security setting for the computer assets;
determining, based at least in part on the security information, at least one of the counter measures associated with the network; and
determining, based at least in part on the security information, a coverage of the at least one of the counter measures within the network.
20. The system of
receiving, via an interface, a portion of the security information from a user; and
automatically discovering a portion of the security information.
21. The system of
empirical testing of counter measures versus actual security threats; survey of security experts including commonly understood best practices; and results of findings by security research organizations.
22. The system of
23. The system of
receiving, via an interface, a selection of the at least one recommendation; and
outputting instructions for implementing the at least one recommendation.
24. The system of
determining an amount that each of the potential security threats contributes to the overall security score;
ranking each of the potential security threats based at least in part on one of the frequency of the threat in empirical testing, the potential impact of the threat, or likelihood of the threat succeeding to determine the amount that each of the potential security threats contributes to the overall security score; and
outputting the potential security threats ordered according to the ranking.
25. The system of
receiving, via an interface, at least one of the potential security threats that is a priority;
re-ranking each of the potential security threats based at least in part on the at least one of the potential security threats being a priority; and
outputting the potential security threats ordered according to the re-ranking.
26. The system of
28. The non-transitory computer readable storage medium of
determining, at a later time, a change in the actual deployment of the counter measures; and
determining a new overall security score for the network based at least in part on the change in the actual deployment and the effectiveness of the counter measures.
29. The non-transitory computer readable storage medium of
outputting the new overall security score;
outputting a change in the new overall security score relative to the overall security score; and
outputting at least one new recommendation for improving the overall security score.
30. The non-transitory computer readable storage medium of
31. The non-transitory computer readable storage medium of
scanning the network for one or more of the computer assets; and
receiving, via an interface, an identification of one or more of the computer assets.
32. The non-transitory computer readable storage medium of
determining security information of the computer assets, wherein the security information comprises at least one of identification of security software installed on the computer assets, vulnerabilities on the computer assets, system settings of the computer assets, security settings of the computer assets, configuration policies of the computer assets, security policies of the computer assets, access information for the computer assets, details of software installed on the computer assets, and a comparison of the access information and the security setting for the computer assets;
determining, based at least in part on the security information, at least one of the counter measures associated with the network; and
determining, based at least in part on the security information, a coverage of the at least one of the counter measures within the network.
33. The non-transitory computer readable storage medium of
receiving, via an interface, a portion of the security information from a user; and
automatically discovering a portion of the security information.
34. The non-transitory computer readable storage medium of
empirical testing of counter measures versus actual security threats; survey of security experts including commonly understood best practices; and results of findings by security research organizations.
35. The non-transitory computer readable storage medium of
36. The non-transitory computer readable storage medium of
receiving, via an interface, a selection of the at least one recommendation; and
outputting instructions for implementing the at least one recommendation.
37. The non-transitory computer readable storage medium of
determining an amount that each of the potential security threats contributes to the overall security score;
ranking each of the potential security threats based at least in part on one of the frequency of the threat in empirical testing, the potential impact of the threat, or likelihood of the threat succeeding to determine the amount that each of the potential security threats contributes to the overall security score; and
outputting the potential security threats ordered according to the ranking.
38. The non-transitory computer readable storage medium of
receiving, via an interface, at least one of the potential security threats that is a priority;
re-ranking each of the potential security threats based at least in part on the at least one of the potential security threats being a priority; and
outputting the potential security threats ordered according to the re-ranking.
39. The non-transitory computer readable storage medium of
|
This application is related to U.S. patent application Ser. No. 13/899,093 filed May 21, 2013, entitled “SYSTEMS AND METHODS FOR DETERMINING AN OBJECTIVE SECURITY ASSESSMENT FOR A NETWORK OF ASSETS” by HD Moore, Roy Donald Hodgman, Dana Elizabeth Wolf, and Matthew Robert Hathaway, the disclosure of which is incorporated by reference herein in its entirety.
In today's distributed computing environments, security is of the utmost importance. Due to the rise of wide-area public networks, users have unlimited access to content, e.g. data, files, applications, programs, etc., from a variety of sources. Additionally, the users' connection to the public networks provides a window for malicious entities to attack the users' computing systems. Malicious entities utilize this ease of accessibility and anonymity to attack the users. For example, the malicious entities can plant viruses, Trojans, or other malicious agents in publicly available content in order to attack the users' computing systems and steal sensitive information from the users and can attack the users' system remotely across the public networks.
To identify security risks in computing systems and networks, users and administrators employ vulnerability assessment and security assessment tools. These tools can identify vulnerabilities in computing systems and networks but only provide discrete information about the vulnerabilities (i.e. that a vulnerability exists). Accordingly, the tools do not provide any assessment of the vulnerabilities within the context of the overall network security.
Various features of the implementations can be more fully appreciated, as the same become better understood with reference to the following detailed description of the implementations when considered in connection with the accompanying figures, in which:
For simplicity and illustrative purposes, the principles of the present teachings are described by referring mainly to examples of various implementations thereof. However, one of ordinary skill in the art would readily recognize that the same principles are equally applicable to, and can be implemented in, all types of information and systems, and that any such variations do not depart from the true spirit and scope of the present teachings. Moreover, in the following detailed description, references are made to the accompanying figures, which illustrate specific examples of various implementations. Electrical, mechanical, logical and structural changes can be made to the examples of the various implementations without departing from the spirit and scope of the present teachings. The following detailed description is, therefore, not to be taken in a limiting sense and the scope of the present teachings is defined by the appended claims and their equivalents.
According to implementations, systems and methods are directed to providing an overall security assessment of a network of computer assets. In implementations, a security assessment tool can determine computer assets in a network and provide an overall security score for the network. The overall security score can represent an objective measure of the security of the network that considers potential security threats to the computer assets, counter measures deployed in the network to address the potential security threats, and the effectiveness of the counter measures. Based on the overall security assessment, the security assessment tool can provide recommendations for improving the security of the network.
As illustrated in
The computer assets 102 can include any type of conventional computer systems that are operating with the network environment 100 or supporting the network environment 100. For example, the network environment 100 can include various types of servers, such as file servers, web servers, application servers, database servers, email servers and the like, that provide services within the network environment 100. Likewise, for example, the computer assets 102 can include laptop computers, desktop computers, tablet computers, mobile phones, and the like used by the personnel of the entities.
Additionally, for example, the computer assets 102 can include other hardware and computer systems that support the network environment 100. For example, the computer assets 102 can include gateways, routers, wireless access points, firewalls, and the like that support any type of communications networks, such as the local area network 104 and the wide area networks 106, to allow the computing systems in the network environment 100 to communicate. In any of the examples, the computer systems in the network environment 100 can include hardware resources, such as processors, memory, network hardware, storage devices, and the like, and software resources, such as operating systems (OS), application programs, and the like.
In addition to physical computer systems, the computer assets 102 can include virtualized computer systems, such as virtual machines (VM). A VM can be a virtualized computer system, or a software implementation of a computer system layered on top of any of physical computer system. The VM's access to the underlying computer system can be controlled through a hypervisor or virtual machine monitor. The VMs can provide for multiple and/or different operating system environments to run concurrently on a single computer system.
While several examples of the computer assets 102 have been described above, the computer assets 102 can include any system, whether physical or virtual, that performs computing processes in the network environment 100. Additionally, the computer assets 102 in the network environment 100 can be located at any location, whether located at single geographic location or remotely located from each other. For example, the network environment 100 can represent the computer assets 102 of a company that is located in multiple geographic locations. As such, one or more of the computer assets 102 can be located at one location (e.g. one office of the company) and one or more of the computer assets 102 can be located at one or more different locations (e.g. satellite offices of the company).
In implementations, the security assessment tool 108 can be configured to assess the overall security of the network environment 100. The security assessment tool 108 can be configured to identify the computer assets 102 of the network environment 100. Once identified, the security assessment tool 108 can be configured to determine the security information of the network environment 100 and the computer assets 102. Based on the security information, the security assessment tool 108 can be configured to determine potential security threats to the network environment 100 and the computer assets 102. Likewise, based on the security information, the security assessment tool 108 can be configured to determine counter measures that are deployed in the network environment 100 and deployed on the computer assets 102 to address the potential security threats. Based on the effectiveness of the deployed counter measures, the security assessment tool 108 can be configured to provide an overall assessment of the security of the network environment 100. Based on the overall security assessment, the security assessment tool 108 can be configured to provide recommendations for improving the security of the network environment 100.
As described herein, a security threat can be any process, method, technique, algorithm, condition, software program, policy, and the like that can be utilized to compromise the security of the network environment 100. For example, a security threat can include known threat vectors for computer assets 102 and the network environment 100, such as known malware, known exploits, known viruses, and the like. A counter measure can include processes, techniques, methods, algorithms, conditions, policies, software programs and the like that can be implemented in the network environment 100 to address potential security threats.
Security information can include any information about the structure of the network environment 100 and any information about the computer assets 102. For example, the security information can include security details of the network environment 100, such as security polices of the network environment 100, details of computer assets 102 (e.g. firewalls) providing security in the network environment 100, and the like. Likewise, for example, the security information can include security details of the computer assets 102, such as the configuration of the computer assets 102, system setting of the computer assets 102, software programs including security software programs installed on the computer assets 102, security settings of the computer assets 102, configuration policies of the computer assets 102, security policies of the computer assets 102, access information for the computer assets 102, and details of software programs installed on the computer assets.
In implementation, the security assessment tool 108 can be configured as a software program that is capable of being stored on and executed by a computer system, whether part of the network environment 100 or external to the network environment 100. The security assessment tool 108 can be written in a variety of programming languages, such as JAVA, C++, Python code, Visual Basic, hypertext markup language (HTML), extensible markup language (XML), and the like to accommodate a variety of operating systems, computing system architectures, etc.
The scanner 110 can include one or more software modules or tools that can scan the network environment 100 and the computer assets 102. The scanner 110 can be configured to determine the structure of the network environment 100 and identify the computer assets 102. Likewise, the scanner 110 can be configured to determine the security information for the network environment 100. Accordingly, the scanner 110 can be configured to include the necessary logic, commands, algorithms, and code to scan the network environment 100 and to communicate computer assets 102. For example, the scanner 110 can include various types of network scanners and vulnerability scanners, such as NeXpose™ or Metasploit™ from Rapid7, LLC.
The threat model 112 can be a listing of known security threats to network environments. The threat model 112 can include the identification of the known security threats and details of the security threats. The details can include the types of the computer assets 102 that are vulnerable to the known security threats, the affect of the known security threats, one or more counter measures that address the known security threats, and the like.
The score model 114 can include the necessary logic, commands, algorithms, and code utilized by the security assessment tool 108 to determine the overall security assessments and provide recommendations as described herein. The score model 114 can include a listing of the counter measures to security threats and a weighting value associated with each of the counter measures. The weighting value can represent the effectiveness of a particular counter measure.
The security assessment tool 108 can also include an interface 116. The interface 116 can be configured to allow one or more users to interact with the security assessment tool 108. The interface 116 can be configured to provide one or more graphical user interfaces (GUIs) and/or command-line interfaces to allow a user to interact with the security assessment tool 108. Likewise, the interface 116 can be configured to provide one or more application programming interfaces (APIs) to allow other software programs to interact with the security assessment tool 108. As described herein, the security assessment tool 108 will be described with reference to a user interacting with the security assessment tool 108. In implementations, a user can include a one or more persons and/or one or more software programs that can interact with the security assessment tool 108.
In implementations, a user can utilize the interface 116 interact with the security assessment tool 108 to perform the overall security assessment. The user can utilize the interface 116 to initiate a security assessment of the network environment 100. The user can utilize the interface 116 to enter information about the network environment 100 and the computer assets 102. For example, the user can enter information about the structure of the network environment 100 such as network addresses of the network environment 100. Likewise, for example, the user can enter information about the computer assets 102, such as identification of the computer assets 102, access information for the computer assets 102, and the like. The security assessment tool 108, for example, the scanner 110, can utilize the information provided by the user when identifying the computer assets 102 and when determining the security information for the network environment 100.
The security assessment tool 108 can utilize the interface 116 to output the results of the overall security assessment. The results can include the security score relative to the potential security threats and the overall security score determined by the security assessment tool 108. The results can also include one or more recommendations for improving the security score relative to the potential security threats and the overall security score. For example, the one or more recommendations can include deploying a new counter measure, changing a security setting of the computer assets 102, changing a system setting of the computer assets 102, changing a security policy of the computer systems 102, updating software of the computer assets 102, installing security software on the computer assets 102, and improving access information for the computer assets 102.
As illustrated, the security assessment tool 108 can be configured to access one or more security resources 118. The security resources 118 can be a source, whether internal or external to the network environment 100, that provides information about security threats and counter measures. For example, the security resources 118 can include security experts, security forums, security literature, empirical security testing platforms, and the like. Likewise, for example, the security resource 118 can include the user of the security assessment tool 108. The security assessment tool 108 can utilize the security resources 118 to generate and update the threat model 112. The security assessment tool 108 can also utilize the security resources 118 to generate and update the score model 114. For example, the security assessment tool 108 can utilize the security resources 118 to determine effectiveness metrics for the counter measures. The effectiveness metrics can be utilized to determine and update the weighting values for the counter measures.
As illustrated, at 202, the process can begin. At 204, the security assessment tool 108 can determine the computer assets 102 in the network environment 100. The security assessment tool 108 can scan the network environment 100 to identify the computer assets 102 in the network environment 100. Likewise, the security assessment tool 108 can receive an identification of computer assets 102 from a user of the security assessment tool 108. Additionally, the security assessment tool 108 can receive, from a user, information about the network environment 100 and the computer assets 102 to assist in scanning the network environment 100.
In 206, the security assessment tool 108 can determine an actual deployment of counter measures on the computer assets. To determine the actual deployment of the counter measurers, the security assessment tool 108 can determine security information of the network environment 100. The security assessment tool 108 can scan the network environment 100 and the computer assets 102 to identify security information. Likewise, the security assessment tool 108 can receive the security information from a user of the security assessment tool 108. Additionally, the security assessment tool 108 can receive, from a user, information about the network environment 100 and the computer assets 102 to assist in scanning the network environment 100.
The security information can include any information about the structure of the network environment 100 and any information about the computer assets 102. For example, the security information can include security details of the network environment 100, such as security polices of the network environment 100, details of computer assets 102 (e.g. firewalls) providing security in the network environment 100, and the like. Likewise, for example, the security information can include security details of the computer assets 102, such as the configuration of the computer assets 102, system setting of the computer assets 102, software programs including security software programs installed on the computer assets 102, security settings of the computer assets 102, configuration policies of the computer assets 102, security policies of the computer assets 102, access information for the computer assets 102, and details of software programs installed on the computer assets.
Once the security information is determined, the security assessment tool 108 can determine potential security threats to the network and determine counter measures to address the potential security threats. Based on the security information, the security assessment tool 108 can examine the threat model 112 to identify the potential security threats to the network environment 100. Additionally, from the threat model 112, the security assessment tool 108 can identify counter measure that can address the potential security threats to the network environment 100.
For example, based on the type and configurations of computer assets 102, the security assessment tool 108 can determine potential security threats. For instance, if one or more of the computer assets 102 are running a particular OS or a particular software program, the security assessment tool 108 can determine any potential security threats and any counter measures that are applicable to the particular OS or software program. Likewise, for instance, if one or more of the computer assets 102 are connected to a public network (e.g. the internet), the security assessment tool 108 can determine any potential security threats and any counter measures that are associated with public networks.
Then, the security assessment tool 108 can determine an actual deployment of the counter measures in the network. Based on the security information and potential security threats, the security assessment tool 108 can determine which counter measures are actually deployed in the network environment 100 and on the computer assets 102. The security assessment tool 108 can determine which of counter measures are deployed and the coverage of the counter measures (e.g. on which computer assets 102 are the counter measures deployed).
In 208, the security assessment tool 108 can determine an overall security score for the network based on the actual deployment of the counter measures, potential security threats, and an effectiveness of the counter measures. The security assessment tool 108 can determine the overall security score based on potential security threats to the network environment 100, the actual deployment of the counter measures in the network environment 100, and effectiveness on the deployed counter measures. The overall security score can include security scores for different security threats. The security score for each security threat can reflect the actual deployment of counter measures for each counter measure and the effectiveness of the deployed counter measures. The overall security score can be the combination of the security scores for each potential security threat.
The security score for each potential security threat and the overall security score can be a numerical value that represents the overall security score for the network environment 100, where a higher numerical value represents better security relative to lower numerical values. For example, the security score for each potential security threat and overall security score can be a numerical value between “0” and “10,” where “0” represents no security for potential security threats and “10” represents complete coverage for the potential security threats. For instance, if for a particular security threat, the network environment 100 has deployed, on 100% of the computer assets 102, a counter measure that is 50% effective in mitigating a the particular security threat. In this instance, the security assessment tool 108 can determine that the overall security score is 5.
The above describes an example of the general process for determining the overall security score. A complete description of examples of determining the security score can be found in the related application, U.S. patent application Ser. No. 13/899,093 filed May 21, 2013, entitled “SYSTEMS AND METHODS FOR DETERMINING AN OBJECTIVE SECURITY ASSESSMENT FOR A NETWORK OF ASSETS” by HD Moore, Roy Donald Hodgman, Dana Elizabeth Wolf, and Matthew Robert Hathaway, the disclosure of which is incorporated by reference herein in its entirety.
In 210, the security assessment tool 108 can determine recommendations for improving the overall security score. The recommendations can include any actions, procedures, processes, and the like for improving the security score relative to the potential security threats and the overall security score. For example, the one or more recommendations can include deploying a new counter measure, changing a security setting of the computer assets 102, changing a system setting of the computer assets 102, changing a security policy of the computer systems 102, updating software of the computer assets 102, installing security software on the computer assets 102, and improving access information for the computer assets 102.
In 212, the security assessment tool 108 can output the overall security score and the recommendations for the network environment 100. For example, the security assessment tool 108 can output the security score for each potential security threat and overall security score via the interface 116. The security assessment tool 108 can output the value of the security score for each potential security threat and overall security score in addition to recommendations to improve the overall security score.
In 214, the security assessment tool 108 can repeat the process above, over time, to determine new overall security scores. As new security threats arise, computer assets are added and removed from the network, new counter measures are determined, and as new counter measured are deployed, the security assessment tool 108 can determine new security score for each potential security threat and a new overall security score. Likewise, the security assessment tool 108 can determine impact of the changes on the new scores.
In 216, the security assessment tool 108 can perform trending analysis over time. The trending analysis can be any procedure or process that determines how the security assessment changes over time. For example, the security assessment tool 108 can track the change in the overall security (or security scores for potential threats), over time, and output a graph or other indication of the changes over time. Likewise, for example, the security assessment tool 108 can track the change in deployment of counter measures, over time, and output a graph or other indication of the changes over time.
In 218, the process can end, repeat, or return to any point.
As illustrated, at 302, the process can begin. In 304, the security assessment tool 108 can initially determine computer assets in a computer network and counter measures deployed on the computer assets. For example, when the security assessment tool 108 first examines the network environment 100, the security assessment tool 108 can determine the computer assets and security information for the network environment 100. The security assessment tool 108 can determine the computer assets and security information according to the procedures as discussed above in
In 306, the security assessment tool 108 can determine the overall security score and the recommendations based on the initial determination. The overall security scores can represent the initial overall security scores before performing any of the recommendations. The security assessment tool 108 can determine the overall security score based on the actual deployment of the counter measures, the potential security threats to the network environment, and an effectiveness of the counter measures according to the procedures as discussed above in
The recommendations can include any actions, procedures, processes, and the like for improving the security score relative to the potential security threats and the overall security score. For example, the one or more recommendations can include deploying a new counter measure, changing a security setting of the computer assets 102, changing a system setting of the computer assets 102, changing a security policy of the computer systems 102, updating software of the computer assets 102, installing security software on the computer assets 102, and improving access information for the computer assets 102.
In 308, one or more of the recommendations can be implemented in the network environment 100. The recommendations can be implemented by the security assessment tool 108. For example, the security assessment tool 108 can access the computer assets and perform the recommended action, such as deploying a new counter measure, changing a security setting of the computer assets 102, changing a system setting of the computer assets 102, changing a security policy of the computer systems 102, updating software of the computer assets 102, installing security software on the computer assets 102, and improving access information for the computer assets 102.
Likewise, a user or other computer system in the network environment 100 can implement the one or more recommendations. If performed by the user, the security assessment tool 108 can output an identification of the one or more recommendations and instructions for performing the one or more recommendations. For example, if the recommendation is changing a security setting of a particular computer asset 102, the security assessment tool 108 can output an identification of the particular computer asset 102, an identification of the security setting to be changed, and instructions for changing the security setting. Based on the output identification and instructions, the user can implement the one or more recommendations.
After the initial assessment, the security assessment tool 108 can perform the security assessment over time to determine have the overall security score changes relative to changes in the network environment 100. In 310, the security assessment tool 108 can determine a change in computer assets in a network, change in counter measures deployed, or change in potential security threats. The security assessment tool 108 can rescan the computer assets 102 and determine new security information and changes in the security information. Likewise, the security assessment tool 108 can determine if computer assets 102 have been removed and added. Additionally, the user of the security assessment tool 108 can enter new security information, changes in the security information, and changes in the computer assets 102. Additionally, the security assessment tool 108 can determine, by examining the threat model 112, new security threats, changes to existing security threats, new counter measures, and changes to existing counter measures.
In 312, the security assessment tool 108 can determine a new overall security score and the new recommendations for improving the security score. The overall security scores can represent the initial overall security scores before performing any of the recommendations. The security assessment tool 108 can determine the overall security score based on the actual deployment of the counter measures, the potential security threats to the network environment, and an effectiveness of the counter measures according to the procedures as discussed above in
The recommendations can include any actions, procedures, processes, and the like for improving the security score relative to the potential security threats and the overall security score. For example, the one or more recommendations can include deploying a new counter measure, changing a security setting of the computer assets 102, changing a system setting of the computer assets 102, changing a security policy of the computer systems 102, updating software of the computer assets 102, installing security software on the computer assets 102, and improving access information for the computer assets 102.
In 314, one or more of the new recommendation can be implemented. The new recommendations can be implemented by the security assessment tool 108. For example, the security assessment tool 108 can access the computer assets and perform the recommended action, such as deploying a new counter measure, changing a security setting of the computer assets 102, changing a system setting of the computer assets 102, changing a security policy of the computer systems 102, updating software of the computer assets 102, installing security software on the computer assets 102, and improving access information for the computer assets 102.
Likewise, a user or other computer system in the network environment 100 can implement the one or more new recommendations. If performed by the user, the security assessment tool 108 can output an identification of the one or more recommendations and instructions for performing the one or more recommendations. For example, if the recommendation is adding a new counter measure, the security assessment tool 108 can output an identification of the counter measure, an identification of the computer assets affected by the new counter measure, and instructions for adding the new counter measure. Based on the output identification and instructions, the user can implement the one or more recommendations.
In 316, the security assessment tool 108 can repeat the process over time as conditions in the network environment 100 change. The security assessment tool 108 can automatically repeat the process at predefined times or at the predetermined internals. Likewise, the security assessment tool 108 can repeat the process at the request of a user or other computer system.
In 318, the security assessment tool 108 can perform trending analysis over time. The trending analysis can be any procedure or process that determines how the security assessment changes over time. For example, the security assessment tool 108 can track the change in the overall security (or security scores for potential threats), over time, and output a graph or other indication of the changes over time. Likewise, for example, the security assessment tool 108 can track the change in deployment of counter measures, over time, and output a graph or other indication of the changes over time.
In 320, the process can end, repeat, or return to any point.
As illustrated in
Once the user has created an account, the security assessment tool 108 can provide a GUI 405 as illustrated in
After the scan in complete, the security assessment tool 108 can determine the overall security assessment for the network environment 100 and display the results in a GUI 410, as illustrate din
Further, as illustrated in
The security assessment tool 108 can also allow a user to search for computer assets 102.
As described above, the security assessment tool 108 can perform trending analysis.
As illustrated in
The computing device 500 can also include one or more network interfaces 508 for communicating via one or more networks, such as Ethernet adapters, wireless transceivers, or serial network components, for communicating over wired or wireless media using protocols. The computing device 500 can also include one or more storage device 510 of varying physical dimensions and storage capacities, such as flash drives, hard drives, random access memory, etc., for storing data, such as images, files, and program instructions for execution by the one or more processors 502.
Additionally, the computing device 500 can include one or more software programs 512, such as the security assessment tool 108. The one or more software programs 512 can include instructions that cause the one or more processors 502 to perform the processes described herein. Copies of the one or more software programs 512 can be stored in the one or more memory devices 504 and/or on in the one or more storage devices 510. Likewise, the data, for example, utilized by one or more software programs 512 can be stored in the one or more memory devices 504 and/or on in the one or more storage devices 510.
In implementations, the computing device 500 can communicate with one or more remote user devices 514 and a network environment 518, such as the network environment 100, via a network 516. The one or more remote user devices 514 can be any types of conventional computing devices. For example, the one or more user devices 514 can be desktops, laptops, servers, etc., or mobile devices, such as smart telephones, tablet computers, cellular telephones, personal digital assistants, etc. The network 516 can be any type of network, such as a local area network, a wide-area network, a virtual private network, the Internet, an intranet, an extranet, a public switched telephone network, an infrared network, a wireless network, and any combination thereof. The network 516 can support communications using any of a variety of commercially-available protocols, such as TCP/IP, OSI, FTP, UPnP, NFS, CIFS, and AppleTalk. The network 516 can be, for example, a local area network, a wide-area network, a virtual private network, the Internet, an intranet, an extranet, a public switched telephone network, an infrared network, a wireless network, and any combination thereof.
In implementations, the computing device 500 can exchange data with the one or more user devices 514 and the network environment 518 over the network 516. For example, the computing device 500 can receive requests to perform security assessments and receive data regarding the security assessment requests.
The computing device 500 and the security assessment tool 108 can be implemented as part of at least one service or Web service, such as may be part of a service-oriented architecture. For example, the computing device 500 can exchange data with the one or more user devices 514 during operation of the at least one service or Web service. Services such as Web services can communicate using any appropriate type of messaging, such as by using messages in extensible markup language (XML) format and exchanged using an appropriate protocol such as SOAP (derived from the “Simple Object Access Protocol”). Processes provided or executed by such services can be written in any appropriate language, such as the Web Services Description Language (WSDL). Using a language such as WSDL allows for functionality such as the automated generation of client-side code in various SOAP frameworks.
In implementations the computing device 500 can be utilized as part of a Web server architecture. In the Web server architecture, the computing device 500 can run any of a variety of server or mid-tier applications, including HTTP servers, FTP servers, CGI servers, data servers, Java servers, and business application servers. The computing device 500 also can be capable of executing programs or scripts in response requests from the one or more remote user devices 514, such as by executing one or more Web applications that may be implemented as one or more scripts or programs written in any programming language, such as Java®, C, C# or C++, or any scripting language, such as Perl, Python, or TCL, as well as combinations thereof. The computing device 500 can also include database servers, including without limitation those commercially available from Oracle®, Microsoft®, Sybase®, and IBM®.
The computing device 500 can include a variety of data stores and other memory and storage media as discussed above. These can reside in a variety of locations, such as on a storage medium local to (and/or resident in) one or more of the computers or remote from any or all of the computers across the network. In some implementations, information can reside in a storage-area network (“SAN”) familiar to those skilled in the art. Similarly, any necessary files for performing the functions attributed to the computers, servers, or other network devices may be stored locally and/or remotely, as appropriate.
In implementations, the components of the computing device 500 as described above need not be enclosed within a single enclosure or even located in close proximity to one another. Those skilled in the art will appreciate that the above-described componentry are examples only, as the computing device 500 can include any type of hardware componentry, including any necessary accompanying firmware or software, for performing the disclosed implementations. The computing device 500 can also be implemented in part or in whole by electronic circuit components or processors, such as application-specific integrated circuits (ASICs) or field-programmable gate arrays (FPGAs).
Certain implementations described above can be performed as a computer applications or programs. The computer program can exist in a variety of forms both active and inactive. For example, the computer program can exist as one or more software programs, software modules, or both that can be comprised of program instructions in source code, object code, executable code or other formats; firmware program(s); or hardware description language (HDL) files. Any of the above can be embodied on a computer readable medium, which include computer readable storage devices and media, and signals, in compressed or uncompressed form. Examples of computer readable storage devices and media include conventional computer system RAM (random access memory), ROM (read-only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes. Examples of computer readable signals, whether modulated using a carrier or not, are signals that a computer system hosting or running the present teachings can be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of executable software program(s) of the computer program on a CD-ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general.
While the teachings have been described with reference to examples of the implementations thereof, those skilled in the art will be able to make various modifications to the described implementations without departing from the true spirit and scope. The terms and descriptions used herein are set forth by way of illustration only and are not meant as limitations. In particular, although the method has been described by examples, the steps of the method may be performed in a different order than illustrated or simultaneously. Furthermore, to the extent that the terms “including”, “includes”, “having”, “has”, “with”, or variants thereof are used in either the detailed description and the claims, such terms are intended to be inclusive in a manner similar to the term “comprising.” As used herein, the terms “one or more of” and “at least one of” with respect to a listing of items such as, for example, A and B, means A alone, B alone, or A and B. Further, unless specified otherwise, the term “set” should be interpreted as “one or more.” Also, the term “couple” or “couples” is intended to mean either an indirect or direct connection. Thus, if a first device couples to a second device, that connection may be through a direct connection, or through an indirect connection via other devices, components, and connections.
Loder, Chad, Wolf, Dana Elizabeth, Hathaway, Matthew Robert
Patent | Priority | Assignee | Title |
10318903, | May 06 2016 | GE DIGITAL HOLDINGS LLC | Constrained cash computing system to optimally schedule aircraft repair capacity with closed loop dynamic physical state and asset utilization attainment control |
10318904, | May 06 2016 | GE DIGITAL HOLDINGS LLC | Computing system to control the use of physical state attainment of assets to meet temporal performance criteria |
10915638, | May 16 2018 | Target Brands Inc. | Electronic security evaluator |
11290475, | Nov 12 2019 | Bank of America Corporation | System for technology resource centric rapid resiliency modeling |
11394733, | Nov 12 2019 | Bank of America Corporation | System for generation and implementation of resiliency controls for securing technology resources |
9930062, | Jun 26 2017 | Factory Mutual Insurance Company | Systems and methods for cyber security risk assessment |
Patent | Priority | Assignee | Title |
7584508, | Dec 31 2008 | AO Kaspersky Lab | Adaptive security for information devices |
20020026591, | |||
20040006704, | |||
20110138471, | |||
20140173738, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
May 21 2013 | RAPID7, LLC | (assignment on the face of the patent) | / | |||
Dec 27 2013 | RAPID7 LLC | Silicon Valley Bank | SECURITY AGREEMENT | 031870 | /0367 | |
Dec 07 2015 | Silicon Valley Bank | RAPID7 LLC | FULL RELEASE OF SECURITY INTEREST IN PATENTS | 037233 | /0889 | |
Dec 22 2015 | WOLF, DANA ELIZABETH | RAPID7, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037477 | /0211 | |
Jan 11 2016 | HATHAWAY, MATTHEW ROBERT | RAPID7, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037477 | /0211 | |
Jan 13 2016 | LODER, CHAD | RAPID7, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 037477 | /0211 | |
Apr 23 2020 | RAPID7 LLC | KEYBANK NATIONAL ASSOCIATION | INTELLECTUAL PROPERTY SECURITY AGREEMENT | 052487 | /0013 |
Date | Maintenance Fee Events |
Jun 17 2019 | M2551: Payment of Maintenance Fee, 4th Yr, Small Entity. |
Feb 07 2022 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Apr 05 2023 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Date | Maintenance Schedule |
Feb 23 2019 | 4 years fee payment window open |
Aug 23 2019 | 6 months grace period start (w surcharge) |
Feb 23 2020 | patent expiry (for year 4) |
Feb 23 2022 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 23 2023 | 8 years fee payment window open |
Aug 23 2023 | 6 months grace period start (w surcharge) |
Feb 23 2024 | patent expiry (for year 8) |
Feb 23 2026 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 23 2027 | 12 years fee payment window open |
Aug 23 2027 | 6 months grace period start (w surcharge) |
Feb 23 2028 | patent expiry (for year 12) |
Feb 23 2030 | 2 years to revive unintentionally abandoned end. (for year 12) |