-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Track known exploited vulnerabilities and notifications update supporting BOD 22-01 #29
Comments
I have a few points that need clarification:
|
Unfortunately, I'm not sure we have great answers for you for most of these, and I am not sure which group would be the responsible team for getting you answers you are looking for that aren't addressed below. In terms of functionality/ease of use, I envision that the best way to capture this in the CyHy database (at least in my mind... you all may have better ideas though) would be to create a "known exploitable" key in the database's cve collection, and I'd use the csv version of the catalog (not sure if that really makes much difference one format or the other).
I do not believe any of the CVEs in the catalog will be removed from the catalog (e.g. you can't undo the exploitability of a particular CVE, but I suppose there is the possibility of a human-made mistake like a typo and they remove/correct it). The list will really only grow.
I don't know how the catalog relates to the temporal scores that get brought in from raw Nessus data captured in the vuln_scan collection. There could be overlap, and there may be some differences. Temporal scores from Nessus are not reported to stakeholders.
Hopefully this helps! |
Note: there is a request for a change to the report language as well: cisagov/cyhy-reports#68 |
Thanks for finding that and connecting the dots @chelsgr! That report language change can definitely be worked as part of this effort, but that is lowest priority for the BOD 22-01 stuff in my mind.
|
Created a separate epic issue to track the multiple pieces of the BOD 22-01 adjustments. |
The summary and requirements for this ticket have been modified to reflect the latest information. |
Currently notifications are only generated for new tickets. The system does not keep state of previously sent notifications. Therefore the "re-alert" logic cannot be implemented without a substantial rewrite of the notification generation subsystem. # Create notifications for Highs (3) or Criticals (4)
if new_ticket["details"]["severity"] > 2:
self.__create_notification(new_ticket) |
@chelsgr and @climber-girl - is this acceptance criteria correct?
The "recently-detected.csv" is part of the weekly reports, not the daily notifications, and should therefore be removed from this issue. |
@dav3r, that was a mix up during requirements gathering/updates. It's noted in the comments for CyHy's report changes ticket and I've removed it from the acceptance criteria here. |
Stop saying
|
I've provided this feedback on the business requirements ticket. I will provide updates once we receive confirmation from CyHy. |
Great catch! We've received confirmation from CyHy the language should be "known exploited" in all instances. |
This comment was marked as off-topic.
This comment was marked as off-topic.
Referencing @felddy's comment on notification generation for new tickets, CyHy provided this feedback: "It is extremely important to notify stakeholders of changes in vuln status that are 'urgent' --- whether that is low/med to high/critical or any non-KEV status to KEV" and requested we "Figure out the re-alerting code as part of the end of this effort". |
Given the discussion above around complications in changing the notification generation functionality, the Leadership and CyHy team are now requesting that change be implemented at the end of this effort. I've created a ticket to track that request separately given the difference in prioritization: #36 |
Summary
BOD 22-01 requires agencies to remediate known-exploitable vulnerabilities according to the timelines set forth in the CISA-managed vulnerability catalog (https://www.cisa.gov/known-exploited-vulnerabilities-catalog). CISA intends to send notifications to Federal stakeholders, as well as non-Federal with tailored messaging within 24 hours of detection.
Notification Modifications
Notification language changes:
Title change:
For Feds:
For Non-Feds:
"Cyber Hygiene scans of your host(s) conducted in the past day have detected new vulnerabilities requiring urgent attention. These vulnerabilities may be critical or high in severity and/or known to be exploitable."
"CISA recommends remediating known exploited vulnerabilities within two weeks, and otherwise remediating critical findings within 15 days and high findings within 30 days."
Vulnerabilities table updates:
Add a new column to the findings.csv attached within the ad-hoc alert to denote “known exploited” vulnerabilities based on the key found in the tickets collection. Mock ups (“NonFed-KEV-in-Alert.pdf” and “Fed-KEV-in-Alert.pdf”) are available on LGX-421 ticket.
Acceptance criteria
Required reporting updates:
The text was updated successfully, but these errors were encountered: