The Vulnerability Management Service, utilizing Nexpose’, is a service that scans and assesses network connected devices to determine vulnerabilities and remediation plans to mitigate risks. It provides a unified security and compliance assessment for the campus physical, virtual, mobile, and cloud environments which improves the performance of the campus security program by giving a complete risk and compliance posture. The service is a component of the State University of New York Security Operations Center.
The service includes the following:
Scan Engine Administration: Integrates with the existing infrastructure to instantly identify and assess vulnerabilities as attack surface changes for scanned hosts.
Scan Template Design & Testing: Custom scan templates are designed based on the type of asset (host), prioritization, and services provided in accordance with minimizing impact on performance.
Asset Inventory Management: Comprehensive inventory of university server assets with assigned prioritization with risk scoring. Provides contextual business intelligence to allow the focus to be on the highest risks through automated asset classification and risk prioritization.
Vulnerability Validation: Exploits that are validated are automatically pushed to scan engine for prioritization and remediation.
Recommends Security Controls: It identifies gaps in defenses and provides a prioritized list of security controls to deploy on endpoints and servers.
Remediation Plans & Reports: Delivers impactful, actionable remediation plans and reports to systems administrators and management to effectively address exploits, efficiently leverage staffing capacity and mitigate risk.
Compliance Management: Enables the university to help address compliance with PCI DSS, NERC CIP, FISMA (USGCB/FDCC), HIPAA/HITECH, SANS Top 20 CSC, DISA STIGS, and CIS standards for risk, vulnerability, and configuration management.
Service Users
ITS systems administrators
CIS systems administrators
User Services
Scan template design, testing and automation
Remediation plans and reports
Scan scheduling and alert management
Business Services
The services are only provided to the current list of service users due to security protocol and staffing limitation.
Technical Services
The services listed include all of the primary technical services.
Requirements
The requirements for using this service included the following:
current systems administrator for internal or external facing server
Rates / Cost of Use
The cost of the service is split between university division based on the field device utilization percentage (e.g. residential vs. academic). There are licensing costs for servers and system users. The service cost is currently covered under SUNY SOC PIA.
Users with emergency systems infrastructure issues can expect a response within 4 hours and should expect a resolution within 48 business hours of entering a ticket.
Change or new installation requests can expect a response within 36 hours and the resolution will depend on the scope of the request.
Business Procedures
Systems fredshare
Change Procedures
Changes to the service (transition, additions, and discontinuations) must be reviewed by TAC and approved by the Service Manager (CIO) and Cabinet. Changes to the configurations, software, hardware or business procedures are reviewed monthly by the campus Security Systems Team.