How Does lywand Assess IT Security?

In this article, you will find out why we have introduced probability of occurrence as a new factor in vulnerability risk assessment, and how IT security assessment works in our Security Audit Platform.

In today's digital world, ensuring IT security is a top priority. It is therefore essential to conduct a comprehensive assessment and establish effective vulnerability management in order to minimise potential risks.

To achieve this goal, we have now integrated the probability of occurrence as a key factor in vulnerability risk assessment, in addition to severity.

Read this article to find out why we have introduced this new factor and how the IT security assessment works in our security audit platform.

Step 1: Performing a Security Audit

The security audit forms the basis of an organisation's overall security strategy and security assessment. We split the process into external and internal audits to analyse all potential vulnerabilities and points of attack.

External Verification

Lywand performs a comprehensive audit of (sub)domains, IP addresses and email addresses. We identify potential vulnerabilities and points of attack from an attacker's perspective on web servers, VPN gateways, mail servers and web applications. We also check whether email addresses and passwords have been compromised.

Our scanning cluster is broad-based and includes both our own scanners and open source tools. Our database contains over 120,000 vulnerabilities.

Internal Verification

We have developed an agent that scans internal targets such as client and server endpoints. It checks for best practice configurations, current patch levels based on known vulnerabilities (CVE) and basic security mechanisms such as the Windows firewall and anti-virus software.

Continuity is Essential

A security audit is only a snapshot in time, as new vulnerabilities may appear the very next day. It is therefore essential to conduct security audits on a regular basis.

Step 2: Risk Assessment of Identified Vulnerabilities

Following a security audit, all identified vulnerabilities are listed. Each vulnerability is assigned a risk rating based on its severity and likelihood of occurrence.

Severity

We use CVSS (Common Vulnerability Scoring System) to determine severity. This score takes into account various metrics such as the impact on confidentiality, integrity and availability of data, as well as the complexity of exploiting the vulnerability.

In reality, many high severity vulnerabilities are often identified. This makes it difficult to prioritise vulnerability management. We therefore consider not only the severity but also the likelihood of occurrence.

Probability of Occurrence

To determine the probability of occurrence, artificial intelligence is used on a daily basis to estimate how likely it is that the vulnerability identified will be exploited by an attacker within the next 30 days.

This depends on a various factors such as how long the vulnerability has been known, the existence of exploit code and the existence of security scanners looking for the vulnerability.

A high severity rating alone does not necessarily mean a high risk if the likelihood of exploitation is low. On the other hand, a low severity vulnerability that is highly likely to be exploited could pose a serious risk.

This approach allows you to use your resources more efficiently and focus on the most important measures.

Step 3: Comprehensive Rating Scale

Finally, the individual risks of the vulnerabilities are combined into an overall security rating. This rating reflects the cumulative risk of the vulnerabilities, with higher risks weighted accordingly.

The resulting security rating is displayed in the security dashboard on a scale from A to F, with F being the worst rating. In the background, the rating is based on a score from 1 to 10, which is linearly correlated with the A to F ratings.

Legend

The legend assigns clear meanings to the ratings to simplify interpretation.

  • A - excellent
    An excellent level of technical security was achieved and (almost) no security vulnerabilities were discovered.

  • B - good
    Good security performance has been achieved and the IT infrastructure is equipped with reliable security measures.

  • C - acceptable
    There is an acceptable level of safety, which is above average. Nevertheless, there is potential for improvement.

  • D - questionable
    There are concerns about the security situation. There are potential risks that should be considered.

  • E - alarming
    There are alarming security vulnerabilities that could potentially be exploited. There is an urgent need for action.

  • F - critical
    Critical security vulnerabilities have been found that are likely to be exploited. Immediate action is required.

Thomas Haak

February 28, 2024

Category

Feature

Might be also Interesting

Feature

Best Practices According to CIS Benchmarks

As part of our security audits, compliance with CIS benchmarks is now also displayed. Read the article to learn more about this new feature and the added value it provides.

August 23, 2024

Feature

Whitelabeling: The Platform in Your Own Look & Feel

Whitelabeling allows you to customize the Security Audit Platform with your own look and feel. To complete the new feature, we have added another "treat": Read-only Access.

March 21, 2024

Feature

Auto Healing: Automated Vulnerability Remediation

Our new feature "Auto Healing" allows you to automatically fix up to 80% of your customers' internal vulnerabilities.

December 4, 2023