-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider a "Time Since Adversarial Activity" decision point #709
Comments
I think I need a better statement of the value this would bring to the folks who have provided this feedback. |
The concept they were expressing was basically this: Given the choice between deploying fixes for two vuls without fixes already deployed, the one with more recent observed adversary activity has higher priority. Let X be the "old" vul and Y be the "new" one. The underlying presumption is that "if we survived this long without patching X, then that is useful information about the actual threat posed by X remaining unpatched, and therefore Y should be given higher priority because it has more recently observed activity." Perhaps it's evidence that other controls aside from patching are sufficient to mitigate the risk posed by X. Some might see this as pragmatism in the face of "too many high priorities, and not enough resources to address them all". An opportunity for perverse incentive exists in that a "slow, but lucky" organization might adopt a "wait and see" attitude toward patching. It also seems to reflect an over-reliance the idea that history is an accurate predictor of the future. And it discounts the idea that an adversary's collection of options includes all unpatched vuls present, selected based on the adversary's utility rather than on any time since last use metric. I'm not claiming I agree with the argument in favor of this being a decision point, I'm just trying to represent the position that led to the suggestion. However, when we encounter a group considering SSVC adoption, and their status quo is that they perceive time since last use as a relevant factor to their existing prioritization scheme, would it be preferable to argue them out of that first (and risk they walk away from SSVC and keep doing what they were already doing), or that SSVC provide them a way to model their decision in a way that is recognizable, with the potential to argue for simplification once they're using it? I don't know whether there is one right answer to that, but I could see where it could be useful have some "less preferred" decision points so we can get folks onboard then drive them toward other ones. |
My suggestion is that SSVC should remain based on evidence-based risk management. I think we can find a middle ground where people can model their existing practice without making it too easy to drop in a decision point that can lead to degenerate outcomes. |
Is your feature request related to a problem? Please describe.
The Exploitation decision point covers three observable states: None, Public PoC, and Active.
However, we have received feedback that time may be a desirable factor in Active. For example, "Active within the past 30 days" is a higher priority than "Active 6-12 months ago" which is a higher priority than "Active 5 years ago". This comes into play in environments where there can be a high degree of lag in the patching process.
Describe the solution you'd like
We should consider whether to add a "time since activity" decision point (that's a placeholder name) that expresses a chunky, exponential bucket sort of time scale to express recency of adversarial activity surrounding a vulnerability.
Additional context
We don't really have a mechanism for directly addressing what I would characterize as "conditional decision points", or decision points that can only be "activated" by some specific state of another decision point. We do have the notion of compound decision points that allow things to be combined into a secondary table, but it's not clear that this is the best way to address this sort of thing. In this case, it might be something like "Activity Recency" (another placeholder name for the same concept as above) can only be evaluated when
Exploitation=Active
. We can say that in words but it'd be nice to be able to express it in rules.It may also be worth considering whether there could/should be a similar "age metric" for
Exploitation=Public PoC
. Or even for the vulnerability information itself: if you haven't patched a 10 year old vul yet, do you need to get right on that, or is the fact that it's survived without you needing to take action evidence that deferring was, and remains, the correct choice?The text was updated successfully, but these errors were encountered: