throbber
(12) United States Patent
`Mohanty
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 9,692.778 B1
`Jun. 27, 2017
`
`USOO9692778B1
`
`(54) METHOD AND SYSTEM TO PRIORITIZE
`VULNERABILITIES BASED ON
`CONTEXTUAL CORRELATION
`
`(71) Applicant: Symantec Corporation, Mountain
`View, CA (US)
`(72) Inventor: Shubhabrata Mohanty, Pune (IN)
`(73) Assignee: Symantec Corporation, Mountain
`View, CA (US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`
`(*) Notice:
`
`(21) Appl. No.: 14/538,599
`
`(22) Filed:
`
`Nov. 11, 2014
`
`(51) Int. Cl.
`H04L 29/06
`G06F 9/455
`(52) U.S. Cl.
`CPC ...... H04L 63/1433 (2013.01); G06F 9/45533
`(2013.01)
`
`(2006.01)
`(2006.01)
`
`(58) Field of Classification Search
`CPC ......................... H04L 63/1433; G06F 9/45533
`See application file for complete search history.
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`2009 OO77666 A1* 3, 2009 Chen ..................... GO6F 21,577
`726/25
`2013/019 1919 A1* 7/2013 Basavapatna ......... GO6F 21,577
`726/25
`
`2014/02O1836 A1* 7, 2014 Amsler ................... HO4L 63.20
`2014/0223555 A1
`8, 2014 Sanz Hernando ...... Goof'55
`726/22
`2/2015 Lee ..................... HO4L 63/1433
`726/25
`
`2015,0040228 A1
`
`OTHER PUBLICATIONS
`
`Mell et al., (The Common Vulnerability Scoring System (CVSS)
`and Its Applicability to Federal Agency Systems, NIST Interagency
`Report 7435, Aug. 2007, 33 pages).*
`Quinn et al. "Guide to Adopting and Using the Security Content
`Automation Protocol (SCAP) Version 1.0”, NIST Special Publica
`tion 800-117, Jul. 2010, 26 pages.*
`* cited by examiner
`Primary Examiner — Saleh Naijar
`Assistant Examiner — Oleg Korsak
`(74) Attorney, Agent, or Firm — Maschoff Brennan
`(57)
`ABSTRACT
`A method for prioritizing vulnerabilities of an asset in a
`virtual computing environment is provided. The method
`includes determining a Vulnerability score for the asset,
`based on at least one of a base vulnerability score or a
`temporal Vulnerability score and receiving information
`about a threat. The method includes correlating the infor
`mation about the threat with information about the open
`Vulnerabilities on the asset and also about the asset to
`determine a threat score for the asset and determining a
`contextual score for the asset based on at least one tag of the
`asset. The method includes deriving a prioritization score for
`the asset, the prioritization score a combination of the
`Vulnerability score, the threat score and the contextual score,
`wherein at least one method action is performed by a
`processor.
`
`20 Claims, 5 Drawing Sheets
`
`104
`
`102
`
`106
`
`
`
`
`
`Tags Category
`and
`Operational Tags
`
`Workload Context
`
`Dynamic
`Security Tags(Like
`in Vmware
`Reported by Various
`Point Products)
`
`
`
`
`
`Dynamic Info/
`Security
`Events
`
`
`
`WIZ, Inc. EXHIBIT - 1075
`WIZ, Inc. v. Orca Security LTD.
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun. 27, 2017
`Jun. 27, 2017
`
`Sheet 1 of 5
`Sheet 1 of 5
`
`US 9,692,778 B1
`US 9,692.778 B1
`
`
`
`104
`104
`
`102
`102
`
`106
`
`
`
`
`
`
`
`106
`
`
`Dynamic
`Dynamic
`
`
`Security Tags(Like
`Tags Category
`Security Tags(Like
`Tags Category
`
`
`
`
`in Vmware
`and
`in Vmware
`Workload COntext
`and
`Workload Context
`
`Operational Tags
`
`Reported by Various
`
`Reported by Various
`
`
`Point Products)
`Point Products)
`
`
`
`
`
`
`Operational Tags
`
`
`
` Dynamic Info/
`Events
`
`Dynamic Info/
`Security
`Security
`Events
`
`
`
`FIG. 1
`FIG. 1
`
`

`

`U.S. Patent
`
`Jun. 27, 2017
`
`Sheet 2 of 5
`
`US 9,692,778 B1
`
`
`
`
`
`
`
`XXXX
`XXXX
`Possible Exploitations
`Impact
`Priority
`Vulnerability
`for Remediation
`
`Contextual Prioritization
`
`~
`
`
`
`
`‘
`
`
`
`
`fr
`
`Prioritization
`
`Score
`
`
`
`
`
`
`
`
`
`
`218~
`
`Contextual Correlation
`
`Threat Score
`
`FIG. 2
`
`206
`
`704
`
`
`
`
`
`
`
`as Date Transferred.
`Dynamic Info Such
`‧
`Intrusion Detected
`。
`Virus Found
`Security Tags
`‧ Web
`。
`‧
`Tags Category
`
`Critical Servers
`Sensitive Data
`
`
`
`
`LZ Workload Context > 10
`
`
`
`
`
`
`
`in Virtual Environment Like VMware Tags
`
`Tags (Static and Security)
`
`202
`Sone
`
`
`
`
`上 Severity
` |* QVE'D
`* Attack Info
`YJ ‧ Target Apps
`
`
`
`
`Contextual
`
`922
`
`
`
`
`
`
`
`
`
`
`212~
`
`Score
`Vulnerability
`
`。Target Os
`
`VA Scanner (Qualys, Rapid7)
`Scanned Vulnerability Databy
`
`228
`226
`224
`
`
`
`
`Exploitability
`Severity
`
`
`
`
`
`
`/
`210
`
`

`

`U.S. Patent
`
`Jun. 27, 2017
`
`Sheet 3 of 5
`
`US 9,692,778 B1
`
`
`
`
`
`
`
`3
`
`FIG.
`
`Resources
`
`
`
`
`Physical Computing
`228、 个
`
`
`
`
`
`
`
`<— Threat Information
`
`
`
`
`7208
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Scanner
`
`
`
`
`
`
`
`
`
`3144
`
`System
`
`y
`
`
`
`
`Threat Intelligence
`_c316
`
`
`
`
`
`
`
`CVE ID
`
`
`
`
`
`
`
`318~
`
`( [_Virtual Machine
`324
`/
`
` 一 202
`
`
`
`
`
`
`
`Virtual Application
`
`
`
`
`320~
`
`Virtual Machine
`
`
`
`
`
`
`318:
`
`322
`
`一 202
`
`一 202
`
`
`
` bab
`
`U7 202
`
`
`
`
`\ | Virtual Application
`
`:
`
`320~
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`224<
`
`
`
`
`
`
`
`
`
`
`Prioritization Score
`
`
`
`
`\ 218~
`
`
`
`
`
`
`
`
`
`
`
`
`"
`
`
`
`
`
`
`
`Contextual Score
`
`
`
`
`216~
`
`
`
`
`Threat Score
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`214~
`Vulnerability Score
`212~
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Remediation Module
`3z0
`Prioritization Module
`312、
`Contextual Module
`310~
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`CVSS Score
`
`
`
`
`
`
`
`
`
`
`222~~
`
`
`
`
`220
`Vulnerability Data
`
`
`
`
`< 一
`
`
`
`
`210~
`
`
`
`
`Threat Module
`
`
`
`
`
`
`
`
`
`
`Processor
`
`
`
`
`304~
`Computing Device
`
`302、
`
`
`
`
`
`
`
`308~
`Vulnerability Module
`306~,
`
`

`

`U.S. Patent
`U.S. Patent
`
`Jun. 27, 2017
`Jun. 27, 2017
`
`Sheet 4 of 5
`Sheet 4 of 5
`
`US 9,692,778 B1
`US 9,692.778 B1
`
`402
`402
`
`404
`404
`
`406
`406
`Correlate Open Vulnerability information with threat
`Correlate open vulnerability information with threat
`408
`408
`
`Determine threat SCOre for asset
`Determine threat score for asset
`
`410
`410
`Correlate Vulnerability data and tag information
`Correlate vulnerability data and tag information
`412
`412
`
`Determine Contextual SCOre for asset
`Determine contextual score for asset
`
`414
`414
`Determine prioritization SCOre for asset based on
`Determineprioritization score for asset based on
`Vulnerability score, threat score, Contextual score
`vulnerability score, threat score, contextual score
`
`
`
`416
`
`Prioritization
`Prioritization
`SCOre meets threshold
`score meets threshold
`?
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Determine Vulnerability score for asset
`Determine vulnerability score for asset
`
`
`Obtain threat information
`Obtain threat information
`
`
`
`
` 416
`
`
`418
`418
`
`420
`420
`
`Determine remediation for asset
`Determine remediation for asset
`
`Apply remediation for asset
`Apply remediation for asset
`
`FIG. 4
`FIG. 4
`
`

`

`U.S. Patent
`
`Jun. 27, 2017
`
`Sheet 5 of 5
`
`US 9,692,778 B1
`
`
`
`全 501
`
`
`信 503
`
`
`CPU
`
`
`
`
`
`Memory
`
`
`
`
`
`S 509
`
`
`
`入 507
`
`
`
`Input/Output
`Device
`
`
`
`
`
`Mass
`Storage
`
`
`
`
`人 511
`
`Display
`
`
`
`
`
`Fig. 5
`
`{~ 505
`Zz
`
`
`BUS
`
`
`
`
`
`
`
`
`

`

`1.
`1
`METHOD AND SYSTEM TO PRIORITIZE
`METHOD AND SYSTEM TO PRIORITIZE
`VULNERABILITIES BASED ON
`VULNERABILITIES BASED ON
`CONTEXTUAL CORRELATION
`CONTEXTUAL CORRELATION
`
`BACKGROUND
`BACKGROUND
`
`Virtualization has redefined how IT ops (information
`Virtualization has redefined how IT ops (information
`technology operations) build and deliver assets in a virtu
`technology operations) build and deliver assets in a virtu-
`alized environment, where virtual machines or virtual appli
`alized environment, where virtual machines or virtual appli-
`cations (apps) go online or offline, or change Zones dynami
`cations (apps) go onlineoroffline, or change zones dynami-
`cally within minutes or hours. Traditional Vulnerability
`cally within minutes or hours. Traditional Vulnerability
`Assessment (VA) products which scan machines to report
`Assessment (VA) products which scan machines to report
`vulnerabilities have difficulties in a virtualized environment.
`Vulnerabilities have difficulties in a virtualized environment.
`A Snapshot of a Vulnerability assessment report of a system
`A snapshot of a vulnerability assessment report of a system
`provided in the past becomes obsolete within hours or
`provided in the past becomes obsolete within hours or
`minutes as virtual machines or workloads change positions
`minutes as virtual machines or workloads change positions
`within a virtualized environment. Consequently, in virtual
`within a virtualized environment. Consequently, in virtual-
`ized environments, any risks, threat exposures or known
`ized environments, any risks, threat exposures or known
`Vulnerabilities are constantly changing. A security opera
`vulnerabilities are constantly changing. A security opera-
`tions team needs a strong and continuous prioritization
`tions team needs a strong and continuous prioritization
`system to track critical vulnerabilities and take actions as
`system to track critical vulnerabilities and take actions as
`changes occur.
`changes occur.
`Vulnerability assessment products scan systems on
`Vulnerability assessment products
`scan systems on
`demand and report a list of known vulnerabilities in the form
`demandandreport a list of known vulnerabilities in the form
`of a CVSS (common vulnerability scoring system) score.
`of a CVSS (common vulnerability scoring system) score.
`With workloads constantly changing their positions, the
`With workloads constantly changing their positions,
`the
`same set of Vulnerabilities changes the exploitability surface
`same set of vulnerabilities changes the exploitability surface
`as well. The challenges presented include how to interpret
`as well. The challenges presented include how to interpret
`hundreds of vulnerabilities reported by these VA products
`hundreds of vulnerabilities reported by these VA products
`and how to identify specific vulnerabilities that truly repre
`and how to identify specific vulnerabilities that truly repre-
`sent a clear and present risk to security. The CVSS score (as
`sent a clear and presentrisk to security. The CVSSscore (as
`either a Base CVSS score or a Temporal CVSS score) does
`either a Base CVSS score or a Temporal CVSS score) does
`not consider the environment-specific characteristics of the
`not consider the environment-specific characteristics of the
`customer or the workload distribution and the threats that
`customer or the workload distribution and the threats that
`can exploit them based on the positioning of the workload.
`can exploit them based on the positioning of the workload.
`The CVSS Base or Temporal score only contains a CIA
`The CVSS Base or Temporal score only contains a CIA
`(confidentiality, integrity, availability) score and access vec
`(confidentiality, integrity, availability) score and access vec-
`tors to derive the importance of the information, but is not
`tors to derive the importance of the information, but is not
`Sufficient in a dynamic environment Such as in virtualization
`sufficient in a dynamic environmentsuchasin virtualization
`space. A CVSS score alone does not necessarily provide
`space. A CVSS score alone does not necessarily provide
`sufficient information for effective remediation prioritiza
`sufficient information for effective remediation prioritiza-
`tion.
`tion.
`It is within this context that the embodiments arise.
`It is within this context that the embodiments arise.
`
`10
`10
`
`15
`
`20
`
`25
`25
`
`30
`30
`
`35
`35
`
`40
`40
`
`SUMMARY
`SUMMARY
`
`45
`45
`
`50
`50
`
`In some embodiments, a method for prioritizing Vulner
`In some embodiments, a method for prioritizing vulner-
`abilities of an asset in a virtual computing environment is
`abilities of an asset in a virtual computing environmentis
`provided. The method includes determining a vulnerability
`provided. The method includes determining a vulnerability
`prioritization score for the asset, based on at least one of a
`prioritization score for the asset, based on at least one of a
`base vulnerability score or a temporal vulnerability score,
`base vulnerability score or a temporal vulnerability score,
`deriving virtual workload context and receiving information
`deriving virtual workload context and receiving information
`about a threat. The method includes correlating the infor
`about a threat. The method includes correlating the infor-
`mation about the threat with information about the asset to
`mation about the threat with information about the asset to
`determine a threat score for the asset and determining a
`determine a threat score for the asset and determining a
`contextual score for the asset based on virtual workload
`contextual score for the asset based on virtual workload
`context in turn is based on multiple tags of the asset as
`context in turn is based on multiple tags of the asset as
`provided by virtualization ecosystem like VMware, AWS,
`provided by virtualization ecosystem like VMware, AWS,
`etc. The method includes deriving a prioritization score for
`etc. The method includes deriving a prioritization score for
`the asset, the prioritization score a combination of the
`the asset,
`the prioritization score a combination of the
`Vulnerability score, the threat score and the contextual score,
`vulnerability score, the threat score and the contextualscore,
`wherein at least one method action is performed by a
`wherein at
`least one method action is performed by a
`processor.
`processor.
`In some embodiments, a tangible, non-transitory, com
`In some embodiments, a tangible, non-transitory, com-
`65
`puter-readable media having instructions thereupon which,
`puter-readable media having instructions thereupon which,
`65
`when executed by a processor, cause the processor to
`when executed by a processor, cause the processor to
`perform a method. The method includes obtaining one of a
`perform a method. The method includes obtaining one of a
`
`55
`55
`
`60
`60
`
`US 9,692,778 B1
`US 9,692,778 B1
`
`2
`2
`base common vulnerability scoring system (CVSS) score or
`base common vulnerability scoring system (CVSS) score or
`a temporal common Vulnerability scoring system score,
`a temporal common vulnerability scoring system score,
`concerning an asset in a virtual computing environment,
`concerning an asset in a virtual computing environment,
`receiving threat information, and generating a threat score
`receiving threat information, and generating a threat score
`for the asset, based on applicability of the threat information
`for the asset, based on applicability of the threat information
`to the asset. The method includes generating a contextual
`to the asset. The method includes generating a contextual
`score for the asset, based on information on at least one
`score for the asset, based on information on at least one
`dynamic or static tag of the asset from virtualization eco
`dynamic orstatic tag of the asset from virtualization eco-
`system and generating a prioritization score for the asset,
`system and generating a prioritization score for the asset,
`based on a multiplication of the contextual score, the threat
`based on a multiplication of the contextual score, the threat
`score and the one of the base common Vulnerability scoring
`score and the one of the base common vulnerability scoring
`system score or the temporal common Vulnerability scoring
`system score or the temporal common vulnerability scoring
`system score.
`system score.
`In some embodiments, a system for prioritizing Vulner
`In some embodiments, a system for prioritizing vulner-
`abilities of an asset in a virtual computing environment. The
`abilities of an asset in a virtual computing environment. The
`system includes a Vulnerability assessment module that
`system includes a vulnerability assessment module that
`obtains a vulnerability score for the asset and a threat
`obtains a vulnerability score for the asset and a threat
`intelligence system that provides a list of Vulnerabilities it
`intelligence system that provides a list of vulnerabilities it
`can exploit, generates a threat score assessing Vulnerability
`can exploit, generates a threat score assessing vulnerability
`of the asset to a threat, based on threat information and based
`of the assetto a threat, based on threat information and based
`on information about the asset from at least one tag of the
`on information about the asset from at least one tag of the
`asset received from virtualization ecosystem platform. The
`asset received from virtualization ecosystem platform. The
`system includes a contextual module that generates a con
`system includes a contextual module that generates a con-
`textual score based on workload contextof the asset relative
`textual score based on workload context of the asset relative
`to static aspects of the asset from the at least one tag and
`to static aspects of the asset from the at least one tag and
`dynamic aspects of the asset from the at least one tag or
`dynamic aspects of the asset from the at least one tag or
`security events and a prioritization module that multiplies
`security events and a prioritization module that multiplies
`together the threat score, the contextual score and the
`together the threat score,
`the contextual score and the
`Vulnerability Score to generate a prioritization score for the
`vulnerability score to generate a prioritization score for the
`asset. The system includes a processor coupled to the
`asset. The system includes a processor coupled to the
`Vulnerability module, the threat module, the contextual
`vulnerability module,
`the threat module,
`the contextual
`module and the prioritization module.
`module and the prioritization module.
`Other aspects and advantages of the embodiments will
`Other aspects and advantages of the embodiments will
`become apparent from the following detailed description
`become apparent from the following detailed description
`taken in conjunction with the accompanying drawings which
`taken in conjunction with the accompanying drawings which
`illustrate, by way of example, the principles of the described
`illustrate, by way of example, the principles of the described
`embodiments.
`embodiments.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`The described embodiments and the advantages thereof
`The described embodiments and the advantages thereof
`may best be understood by reference to the following
`may best be understood by reference to the following
`description taken in conjunction with the accompanying
`description taken in conjunction with the accompanying
`drawings. These drawings in no way limit any changes in
`drawings. These drawings in no way limit any changes in
`form and detail that may be made to the described embodi
`form and detail that may be madeto the described embodi-
`ments by one skilled in the art without departing from the
`ments by one skilled in the art without departing from the
`spirit and scope of the described embodiments.
`spirit and scope of the described embodiments.
`FIG. 1 is a schematic diagram illustrating the workload
`FIG. 1 is a schematic diagram illustrating the workload
`context of an asset in a virtual environment in some embodi-
`context of an asset in a virtual environment in some embodi
`ments.
`mentS.
`FIG. 2 is a schematic diagram, showing how threat
`FIG. 2 is a schematic diagram, showing how threat
`information, Scanned Vulnerability data and tag information
`information, scanned vulnerability data and tag information
`for the asset are combined into a contextual correlation, so
`for the asset are combined into a contextual correlation, so
`that a prioritization score is produced in Some embodiments.
`that a prioritization score is produced in some embodiments.
`FIG. 3 is a system diagram of a contextual prioritization
`FIG. 3 is a system diagram of a contextual prioritization
`system that prioritizes vulnerabilities of the asset, based on
`system that prioritizes vulnerabilities of the asset, based on
`contextual correlation in accordance with the concept dia
`contextual correlation in accordance with the concept dia-
`grams of FIGS. 1 and 2 in some embodiments.
`grams of FIGS. 1 and 2 in some embodiments.
`FIG. 4 is a flow diagram of a method of prioritizing
`FIG. 4 is a flow diagram of a method of prioritizing
`vulnerabilities of an asset in a virtual environment in some
`Vulnerabilities of an asset in a virtual environment in some
`embodiments.
`embodiments.
`FIG. 5 is an illustration showing an exemplary computing
`FIG.5 is an illustration showing an exemplary computing
`device which may implement the embodiments described
`device which may implement the embodiments described
`herein.
`herein.
`
`DETAILED DESCRIPTION
`DETAILED DESCRIPTION
`
`A contextual prioritization system and a related method of
`Acontextual prioritization system and a related method of
`prioritizing Vulnerabilities of an asset in a virtual environ
`prioritizing vulnerabilities of an asset in a virtual environ-
`
`

`

`US 9,692,778 B1
`US 9,692,778 B1
`
`10
`10
`
`15
`15
`
`20
`
`30
`30
`
`35
`35
`
`3
`4
`3
`4
`ment produce a prioritization score for the asset, relating to
`FIG. 1 is a schematic diagram of the workload context
`FIG. 1 is a schematic diagram of the workload context
`ment producea prioritization score for the asset, relating to
`102 of an asset in a virtual environment. Insights into
`Vulnerabilities, threats and a workload context of the asset.
`vulnerabilities, threats and a workload context of the asset.
`102 of an asset
`in a virtual environment. Insights into
`various aspects of the workload context 102 provide guid
`By correlating and combining threat information, Vulner
`various aspects of the workload context 102 provide guid-
`Bycorrelating and combining threat information, vulner-
`ance into operation of the system and method. When an asset
`ability data and workload context, and rapidly updating the
`ance into operation of the system and method. Whenan asset
`ability data and workload context, and rapidly updating the
`(e.g., a virtual machine or a virtual application) is created
`prioritization score that results from Such analysis, the
`(e.g., a virtual machine or a virtual application) is created
`prioritization score that results from such analysis,
`the
`and deployed in a virtual environment, information about
`and deployed in a virtual environment, information about
`disclosed system and method provide information that is
`disclosed system and method provide information that is
`the asset can be written as metadata to one or more tags (see
`the asset can be written as metadata to one or more tags (see
`more context-based than the CVSS (common vulnerability
`more context-based than the CVSS (common vulnerability
`FIGS. 2 and 3). Further information can be written to tags as
`FIGS. 2 and 3). Further information can be written to tags as
`scoring system) score.
`scoring system) score.
`situations occur. Static tags 104 have information about tag
`situations occur. Static tags 104 have information about tag
`Adding dynamic context about which Vulnerabilities are
`Adding dynamic context about which vulnerabilities are
`categories, i.e., each tag category could have one or more
`categories, i.e., each tag category could have one or more
`being exploited using known exploits, and relating this to
`being exploited using known exploits, and relating this to
`tags as information about the asset. These static tags 104
`tags as information about the asset. These static tags 104
`environmental characteristics of an asset, provides an
`environmental characteristics of an asset, provides an
`could also be referred to as operational tags, in that the static
`could also be referred to as operationaltags, in that the static
`improved mechanism of determining whether or not a given
`improved mechanism of determining whetheror not a given
`tag 104 specifies aspects of the operation of the asset. Static
`tag 104 specifies aspects of the operation of the asset. Static
`virtual machine or virtual application is at high risk from an
`virtual machineor virtual application is at high risk from an
`tag information affects the workload context 102 of the
`tag information affects the workload context 102 of the
`attack perspective. Considering only a CVSS score reported
`attack perspective. Considering only a CVSS score reported
`asset. Dynamic tags 106 have information that is subject to
`asset. Dynamic tags 106 have information that is subject to
`by a VA (Vulnerability assessment) product could be mis
`by a VA (vulnerability assessment) product could be mis-
`change during the lifespan of the asset. Dynamic tags 106
`change during the lifespan of the asset. Dynamic tags 106
`leading or insufficient, as the CVSS score does not consider
`leading or insufficient, as the CVSS score does not consider
`can also be referred to as security tags, since the changing
`can also be referred to as security tags, since the changing
`factors of the asset environment that drive the criticality or
`factors of the asset environmentthat drive the criticality or
`information is of interest regarding security of the asset.
`information is of interest regarding security of the asset.
`risk exposure of the asset. For example, a possible high
`Dynamic tag information affects the workload context 102
`risk exposure of the asset. For example, a possible high
`Dynamic tag information affects the workload context 102
`CVSS score could be indicated for an asset that has a low
`of the asset. Dynamic information and security events 108
`CVSS score could be indicated for an asset that has a low
`of the asset. Dynamic information and security events 108
`risk of being exploited in some instances. Meanwhile, an
`affect the workload context 102, particularly as to Vulner
`risk of being exploited in some instances. Meanwhile, an
`affect the workload context 102, particularly as to vulner-
`asset with a high vulnerability but a low CVSS score may
`ability of the asset. Some of the dynamic information and
`ability of the asset. Some of the dynamic information and
`asset with a high vulnerability but a low CVSS score may
`security events can be written to the dynamic tags 106.
`still be attacked depending upon other environmental factors
`security events can be written to the dynamic tags 106.
`still be attacked depending upon other environmental factors
`in the asset environment such as threats associated with the
`FIG. 2 is a schematic diagram, showing how threat
`in the asset environment such as threats associated with the
`FIG. 2 is a schematic diagram, showing how threat
`25
`Vulnerability, probability of attack based on workload or VM
`information 208, scanned vulnerability data 210 and work
`information 208, scanned vulnerability data 210 and work-
`vulnerability, probability of attack based on workload or VM
`25
`(virtual machine) positioning, compensating controls or
`load context as tags, information 204, 206 for the asset 224
`load context as tags, information 204, 206 for the asset 224
`(virtual machine) positioning, compensating controls or
`primary controls present in the asset environment, etc.
`are combined into a contextual correlation, so that a priori
`are combined into a contextual correlation, so that a priori-
`primary controls present in the asset environment,etc.
`Security Operations (also referred to as Sec Ops) teams
`tization score 218 is produced in some embodiments. Threat
`tization score 218 is produced in some embodiments. Threat
`Security Operations (also referred to as Sec Ops) teams
`need solutions that help them distinguish the critical vul
`information 208 comes from one or more threat intelligence
`information 208 comes from one or morethreat intelligence
`need solutions that help them distinguish the critical vul-
`nerabilities from the noise or false-positives. For example, a
`systems (see FIG. 3). Vulnerability data 210 comes from one
`systems(see FIG. 3). Vulnerability data 210 comes from one
`nerabilities from the noise or false-positives. For example, a
`mission critical Internet Banking web server may have
`or more scanners (see FIG. 3). Tag information 204, 206
`or more scanners (see FIG. 3). Tag information 204, 206
`mission critical Internet Banking web server may have
`multiple known vulnerabilities, but which of those present
`comes from one or more tags 202 in the virtualization
`comes from one or more tags 202 in the virtualization
`multiple known vulnerabilities, but which of those present
`genuine risk to the organization may be unknown. Various
`ecosystem like VMware of the asset 224. Threat intelligence
`ecosystem like VMwareofthe asset 224. Threat intelligence
`genuine risk to the organization may be unknown. Various
`systems such as DEEPSIGHT provide threat information
`embodiments of a system and method described below
`systems such as DEEPSIGHT provide threat information
`embodiments of a system and method described below
`identify assets as to criticality of Vulnerability, thereby
`208 about external threats. The embodiments of the system
`208 about external threats. The embodiments of the system
`identify assets as to criticality of vulnerability,
`thereby
`and method described herein correlate vulnerabilities with
`lowering incidence of false positives and increasing aware
`and method described herein correlate Vulnerabilities with
`lowering incidence of false positives and increasing aware-
`emerging threats to derive threat exposure, the risk the
`ness of assets that are critical, which may require immediate
`emerging threats to derive threat exposure,
`the risk the
`ness of assetsthat are critical, which may require immediate
`Vulnerability poses, and the importance of remediating Such
`attention of a security operations team. This solves a critical
`
`attention of a security operations team. Thissolvesacritical vulnerability poses, and the importance of remediating such
`problem in virtualization space, by identifying, correlating,
`risk. Threats play an important role in deriving the exploit
`problem in virtualization space, by identifying, correlating,
`risk. Threats play an important role in deriving the exploit-
`calculating and determining the prioritization of Vulnerabili
`ability characteristics of a vulnerability depending on the
`calculating and determiningtheprioritization of vulnerabili-
`ability characteristics of a vulnerability depending on the
`ties that pose serious risk to an organization that has oper
`asset environment. For example, a Vulnerability found on a
`ties that pose serious risk to an organization that has oper-
`asset environment. For example, a vulnerability found on a
`web server facing to internet with a CVSS score of “10” may
`ating assets in a virtualized environment.
`ating assets in a virtualized environment.
`webserver facing to internet with a CVSS score of “10” may
`The system and method employ an algorithm that corre
`have a serious impact if exposed to an external threat, as
`The system and method employ an algorithm that corre-
`have a serious impact if exposed to an external threat, as
`lates vulnerabilities with contextual
`information such as
`compared to the same Vulnerability existing on a web server
`lates Vulnerabilities with contextual information such as
`compared to the same vulnerability existing on a web server
`threat data and virtualization tags (e.g., as provided in the
`that is sitting in a LAN (local area network) with an
`threat data and virtualization tags (e.g., as provided in the
`that
`is sitting in a LAN (local area network) with an
`exposure to the same threat but with a low impact. Threat
`virtualization environment by a vendor such as VMware,
`virtualization environment by a vendor such as VMware,
`exposure to the same threat but with a low impact. Threat
`information 208 reported by systems such as DEEPSIGHT
`etc). The algorithm works on a three dimensional (or three
`etc). The algorithm works on a three dimensional (or three
`information 208 reported by systems such as DEEPSIGHT
`or other systems may include a common Vulnerabilities and
`axis) model in Some embodiments. The three dimensions are
`axis) model in some embodiments. The three dimensionsare
`or other systems may include a common vulnerabilities and
`summarized below:
`exposures identifier (CVEID) 220 that identifies a specific
`summarized below:
`exposures identifier (CVE ID) 220 that identifies a specific
`Dimension#1—Vulnerability (e.g., as reported by Vulner
`Vulnerability and/or a specific exposure that a particular
`Dimension#1—Vulnerability (e.g., as reported by vulner-
`vulnerability and/or a specific exposure that a particular
`threat exploits, the operating system (OS) targeted by a
`ability assessment products). Related data could
`ability assessment products). Related data could
`threat exploits,
`the operating system (OS) targeted by a
`particular threat, the threat impact, a specific threat type
`include base/temporal CVSS score, common vulner
`include base/temporal CVSS score, common vulner-
`particular threat, the threat

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket