Ordered computer vulnerability remediation reporting
First Claim
1. A method comprising:
- identifying a set of remediations that is associated with a risk score and a set of computing vulnerabilities;
prior to applying any remediation in the set of remediations to a corresponding computing vulnerability in the set of computing vulnerabilities;
for each remediation in the set of remediations, determining an amount that the risk score would be reduced if said each remediation is applied to a corresponding computing vulnerability in the set of computing vulnerabilities, wherein determining comprises;
determining that a first remediation in the set of remediations would reduce the risk score by a first amount, anddetermining that a second remediation in the set of remediations would reduce the risk score by a second amount;
ordering the set of remediations to generate an ordered set of remediations based, at least in part, on the amount determined for each remediation in the set of remediations, wherein the first remediation is ranked higher than the second remediation in the ordered set of remediations based on the first amount being greater than the second amount;
applying each remediation in the ordered set of remediations;
wherein applying each remediation in the ordered set of remediations results in removing a computing vulnerability that corresponds to said each remediation;
wherein ordering is performed by one or more computing devices.
3 Assignments
0 Petitions
Accused Products
Abstract
Techniques for ranking a set of vulnerabilities of a computing asset and set of remediations for a computing asset, and determining a risk score for one or more computing assets are provided. In one technique, vulnerabilities of computing assets in a customer network are received at a vulnerability intelligence platform. Breach data indicating set of breaches that occurred outside customer network is also received. A subset of the set of vulnerabilities that are most vulnerable to a breach is identified based on the breach data. In another technique, multiple vulnerabilities of a computing asset are determined. A risk score is generated for the computing asset based on the vulnerabilities. In another technique, multiple remediations associated with a risk score and multiple vulnerabilities are identified. The remediations are ordered based on the remediations that would reduce the risk score the most if those remediations were applied to remove the corresponding vulnerabilities.
-
Citations
21 Claims
-
1. A method comprising:
-
identifying a set of remediations that is associated with a risk score and a set of computing vulnerabilities; prior to applying any remediation in the set of remediations to a corresponding computing vulnerability in the set of computing vulnerabilities; for each remediation in the set of remediations, determining an amount that the risk score would be reduced if said each remediation is applied to a corresponding computing vulnerability in the set of computing vulnerabilities, wherein determining comprises; determining that a first remediation in the set of remediations would reduce the risk score by a first amount, and determining that a second remediation in the set of remediations would reduce the risk score by a second amount; ordering the set of remediations to generate an ordered set of remediations based, at least in part, on the amount determined for each remediation in the set of remediations, wherein the first remediation is ranked higher than the second remediation in the ordered set of remediations based on the first amount being greater than the second amount; applying each remediation in the ordered set of remediations; wherein applying each remediation in the ordered set of remediations results in removing a computing vulnerability that corresponds to said each remediation; wherein ordering is performed by one or more computing devices. - View Dependent Claims (2, 3, 4, 5, 6, 19)
-
-
7. One or more non-transitory computer-readable media storing instructions which, when executed by one or more processors, cause:
-
identifying a set of remediations that is associated with a risk score and a set of computing vulnerabilities; prior to applying any remediation in the set of remediations to a corresponding computing vulnerability in the set of computing vulnerabilities; for each remediation in the set of remediations, determining an amount that the risk score would be reduced if said each remediation is applied to a corresponding computing vulnerability in the set of computing vulnerabilities, wherein determining comprises; determining that a first remediation in the set of remediations would reduce the risk score by a first amount, and determining that a second remediation in the set of remediations would reduce the risk score by a second amount; ordering the set of remediations to generate an ordered set of remediations based, at least in part, on the amount determined for each remediation in the set of remediations, wherein the first remediation is ranked higher than the second remediation in the ordered set of remediations based on the first amount being greater than the second amount; applying each remediation in the ordered set of remediations; wherein applying each remediation in the ordered set of remediations results in removing a computing vulnerability that corresponds to said each remediation. - View Dependent Claims (8, 9, 10, 11, 12, 20)
-
-
13. An apparatus comprising:
-
one or more hardware processors; one or more computer-readable media storing instructions which, when executed by the one or more hardware processors, cause; identifying a set of remediations that is associated with a risk score and a set of computing vulnerabilities; prior to applying any remediation in the set of remediations to a corresponding computing vulnerability in the set of computing vulnerabilities; for each remediation in the set of remediations, determining an amount that the risk score would be reduced if said each remediation is applied to a corresponding computing vulnerability in the set of computing vulnerabilities, wherein determining comprises; determining that a first remediation in the set of remediations would reduce the risk score by a first amount, and determining that a second remediation in the set of remediations would reduce the risk score by a second amount; ordering the set of remediations to generate an ordered set of remediations based, at least in part, on the amount determined for each remediation in the set of remediations, wherein the first remediation is ranked higher than the second remediation in the ordered set of remediations based on the first amount being greater than the second amount; applying each remediation in the ordered set of remediations; wherein applying each remediation in the ordered set of remediations results in removing a computing vulnerability that corresponds to said each remediation. - View Dependent Claims (14, 15, 16, 17, 18, 21)
-
Specification