U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

NISTIR 8011 Vol. 4 (Draft)

Automation Support for Security Control Assessments: Software Vulnerability Management

Date Published: November 2019
Comments Due: December 20, 2019 (public comment period is CLOSED)
Email Questions to: sec-cert@nist.gov

Author(s)

Kelley Dempsey (NIST), Eduardo Takamura (NIST), Paul Eavy (DHS), George Moore

Announcement

When known software vulnerabilities are unmanaged, uncorrected, or undetected, attack vectors are left open to exploit the software. As a result, vulnerable software becomes a key target that attackers can use to initiate an attack on an organization’s network and expand control to attack other components on the network. By managing these vulnerabilities, the level of effort needed to initiate such an attack and expand control to other components on the network is greatly increased. Automated assessment of known software vulnerabilities and weaknesses helps verify that the software vulnerability management capability is working. To facilitate this effort, NIST and DHS researchers have developed an automated process to assess the effectiveness of the security controls that provide the information security capability known as Software Vulnerability Management (VULN), the focus of which is to manage risk created by defects present in software on the network.

This is the initial public draft release of NIST Internal Report (NISTIR) 8011 Volume 4, Automation Support for Security Control Assessments: Software Vulnerability Management. This NISTIR provides an operational approach for automating security control assessments to manage vulnerabilities in software. This approach is consistent with the NIST Risk Management Framework as described in NIST Special Publication (SP) 800-37 and the guidance in NIST SPs 800-53 and 800-53A, in particular. A total of 13 volumes are planned for NISTIR 8011. Volumes 1 and 2 were published in 2017, and Volume 3 was published in 2018. Volume 4 provides details specific to the software vulnerability management security capability. Subsequent volumes will provide details specific to each capability and will be organized similarly to Volumes 2 through 4.

NOTE: A call for patent claims is included on page iv of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications.

Abstract

Keywords

actual state; assessment; authorization boundary; automation; capability; Common Vulnerability and Exposure (CVE); Common Weakness Enumeration (CWE); dashboard; defect; desired state specification; dynamic code analyzer; Information Security Continuous Monitoring (ISCM); malicious code; malware; mitigation; ongoing assessment; patch management; root cause analysis; security capability; security control item; security control; software file; Software Identification (SWID) tag; software injection; software product; software vulnerability; software weakness; software; static code analyzer
Control Families

None selected

Documentation

Publication:
NISTIR 8011 Vol. 4 (Draft) (DOI)
Local Download

Supplemental Material:
None available

Document History:
11/20/19: NISTIR 8011 Vol. 4 (Draft)
04/28/20: NISTIR 8011 Vol. 4 (Final)