Big Data Security - Challenges & Solutions
It may be revolutionising the way we do business - but is Big Data secure?
+ read more
An overview of Attack Path Mapping, an asset-centric approach that helps prioritise security spending
Vulnerability-centric testing is pretty much baked into our industry. But it has limitations and drawbacks. For example a lot of organisations struggle to manage a list of Highs, Mediums and Lows which only ever grows, however much remediation effort gets thrown at it. And more importantly, advanced attackers can compromise corporate networks without having to rely on technical vulnerabilities.
Another subtle but important limitation is that many business managers don't really understand the language of vulnerabilities - so it's hard to get their attention about (say) increasing security budgets in terms of lists of vulnerabilities.
In contrast, Attack Path Mapping (APM) is an asset-centric approach that helps prioritise investments in controls, mitigations, and remediations.
It works by starting with the assets that matter most, or the risks that would hurt the business most. These are then used to map, and validate, all the routes an attacker could use to reach those things. This drives priorities – targeted, precision improvements in terms of what vulnerabilities to fix & what attack paths to close, how to channel potential attackers, what controls to strengthen, where detection needs improving.
A lot of good things come out of this:
Of course APM isn't always the right thing to do, right now:
If you can share with us your thoughts on what the most important assets are to your business, or what attackers’ objectives are most important to prevent, then we’ll ask a few questions about your IT estate – based on which we can suggest a plan of work to share between your team and ours.
Or as a first step, please get in touch with your usual MWR contact and they'll be glad to provide more details of APM and how it works.