Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(vm-docs): add page about priority rank #16694

Merged
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,118 @@
---
title: Understanding vulnerability prioritization
metaDescription: Use Vulnerability Management to overcome blindspots and assign remediation to developers as a security team.
freshnessValidatedDate: never
---

import vmPriority from 'images/vuln-priority-security.webp'

This document covers:
- Where to find priority ranks in Vulnerability Management
- What data factors into the priority ranks of vulnerabilities

## Viewing priority rank in Vulnerability Management

<img
title="Vulnerability Management prioritization"
alt="An image showing the vulnerabilities prioritization on the Vulnerability Management vulnerability list page."
src={vmPriority}
/>

<figcaption>
<DoNotTranslate>**[one.newrelic.com > All capabilities](https://one.newrelic.com/all-capabilities) > Vulnerability Management > (select vulnerabilities tab)**</DoNotTranslate>
</figcaption>

The priority ranking is based on all known data about a vulnerability. The “reason to prioritize” column is a summary and weighting of key CVSS (Common Vulnerability Scoring System), EPSS (Exploit Prediction Scoring System), IAST confirmed findings, and known active ransomware data.

## Data influencing priority rank

<CollapserGroup>
<Collapser
className="freq-link"
id="severity"
title="Severity data"
>
**Severity** is based on the vulnerability’s CVSS score. An open industry standard, CVSS uses a formula of several access and impact metrics to calculate the severity of the vulnerability.

This table shows the tags we’ve assigned corresponding to CVSS scores.
<table>
<thead>
<tr>
<th>Severity</th>
<th>CVSS range</th>
</tr>
</thead>
<tbody>
<tr>
<td>Critical</td>
<td>9.0 - 10.0</td>
</tr>
<tr>
<td>High</td>
<td>7.0 - 8.9</td>
</tr>
<tr>
<td>Medium</td>
<td>4.0 - 6.9</td>
</tr>
<tr>
<td>Low</td>
<td>0.1 - 3.9</td>
</tr>
<tr>
<td>Info / None</td>
<td>0.0</td>
</tr>
</tbody>
</table>
</Collapser>
<Collapser
className="freq-link"
id="active-ransomware"
title="Active ransomware data"
>
**Active ransomware** are vulnerabilities that have been used in known ransomware campaigns. The severe impacts of ransomware incidents make these vulnerabilities a high priority.
</Collapser>
<Collapser
className="freq-link"
id="exploit-probability"
title="Exploit probability(EPSS) data"
>
**Exploit probability** scores are based on EPSS, which rates the probability that a vulnerability will be exploited in the wild. In these cases, there are known instances of threat actors taking advantage of the vulnerability. EPSS scores can look low out of context, but security experts recommend giving higher priority to all vulnerabilities with an exploit probability above the 85th percentile. This indicates a significant risk that that vulnerability will be exploited.

This table shows the tags we’ve assigned to each level of exploit probability.
<table>
<thead>
<tr>
<th>Exploit probability</th>
<th>EPSS percentile</th>
</tr>
</thead>
<tbody>
<tr>
<td>Exploit extremely probable</td>
<td> >95%</td>
</tr>
<tr>
<td>Exploit very probable</td>
<td> >90%</td>
</tr>
<tr>
<td>Exploit probable</td>
<td> >85%</td>
</tr>
</tbody>
</table>
</Collapser>
<Collapser
className="freq-link"
id="iast-confirmed"
title="IAST confirmed data"
>
**IAST confirmed** are vulnerabilities found in your custom code that are confirmed to actually be exploitable even if threat actors may not be aware of the exploit.
</Collapser>
</CollapserGroup>

### Example of ranking logic

A vulnerability that’s "high" severity with an EPSS of “exploit probable” might rank higher than a vulnerability with a "critical" severity with an EPSS level that’s lower than an 85th percentile probability of exploitation.
Binary file added src/images/vuln-priority-security.webp
Binary file not shown.
2 changes: 2 additions & 0 deletions src/nav/vuln-management.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,8 @@ path: /docs/vulnerability-management
pages:
- title: Get started with vulnerability management
path: /docs/vulnerability-management/overview
- title: Understanding vulnerability prioritization
path: /docs/vulnerability-management/understanding-prioritization
- title: Manage vulnerabilities as a developer
path: /docs/vulnerability-management/dev-workflow
- title: Manage vulnerabilities as a security team
Expand Down
Loading