{"id":3602,"date":"2025-11-26T06:22:29","date_gmt":"2025-11-26T06:22:29","guid":{"rendered":"http:\/\/69269ca5fd8a399dacc316c9"},"modified":"2025-11-26T06:22:29","modified_gmt":"2025-11-26T06:22:29","slug":"risk-based-vulnerability-management-rbvm-2","status":"publish","type":"post","link":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/2025\/11\/26\/risk-based-vulnerability-management-rbvm-2\/","title":{"rendered":"Risk Based Vulnerability Management (RBVM)"},"content":{"rendered":"<p>Risk Based Vulnerability Management (or <a href=\"https:\/\/seconize.co\/blog\/assessment-va-pt\/\">RBVM<\/a>) is a process by which one evaluates the business risk for an organization resulting from its vulnerable digital assets and helps organization achieve an acceptable security posture by prioritizing the remediation.<\/p>\n<h2>Current challenges<\/h2>\n<h5>Organizations are managing risk by :-<\/h5>\n<h6>i. <u>Complying to Industry Standards<\/u><\/h6>\n<p>E.g. ISO 27001:2022, NIST-CSF. This is via manual audits, which is time consuming and laborious. It is enough for an organization to achieve a cyber hygiene, but not sufficient to counter cyber-attacks, which are ever changing!<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/3-2-150x150.png\" sizes=\"(max-width: 150px) 100vw, 150px\" srcset=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/3-2-150x150.png 150w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/3-2-80x80.png 80w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/3-2-70x70.png 70w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/3-2-100x100.png 100w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/3-2-75x75.png 75w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/3-2-300x300.png 300w\" alt=\"\" width=\"150\" height=\"150\"><\/p>\n<h6>ii. Performing Vulnerability Assessments<\/h6>\n<p>Typically tool based, identifies vulnerabilities in assets by looking up popular vulnerability databases, like NVD (National Vulnerability Database).<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/10-1-e1602069359629-150x150.png\" sizes=\"(max-width: 150px) 100vw, 150px\" srcset=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/10-1-e1602069359629-150x150.png 150w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/10-1-e1602069359629-80x80.png 80w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/10-1-e1602069359629-70x70.png 70w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/10-1-e1602069359629-100x100.png 100w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/10-1-e1602069359629-75x75.png 75w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/10-1-e1602069359629-300x300.png 300w\" alt=\"\" width=\"150\" height=\"150\"><\/p>\n<p>Another class of issues is&nbsp;<strong>Misconfiguration.&nbsp;<\/strong>Though these are not the classic vulnerabilities, they do render the asset vulnerable. These are checks performed against popularly accepted industry benchmarks like <strong>CIS<\/strong> (Centre for Internet Security).<\/p>\n<p>The IT infrastructure of an organization today is diverse, spread across the cloud, on-premise and employees working from home. The vulnerability assessment must cover the assets in the above scenarios.<\/p>\n<h6>Challenges with Vulnerability Assessments<\/h6>\n<ul>\n<li style=\"text-align: left;\">The findings from these&nbsp; assessments are quite technical in nature.<\/li>\n<li style=\"text-align: left;\">Severity of the issues are based on <strong>CVSS<\/strong> (Common Vulnerability Scoring System), which is constant and does not take the organization context into account.<\/li>\n<li style=\"text-align: left;\">Reports of the each of the asset type are different, given 8-10 asset types, there is no way to correlate and normalize them.<\/li>\n<li style=\"text-align: left;\">The number of issues identified are large, with tens of assets, the identified issues can be in the thousands.<\/li>\n<\/ul>\n<p>99% of the vulnerabilities exploited are already known!<\/p>\n<p>Based on this finding, two reasons can be attributed to any\/most incidents:<\/p>\n<p>i. The organization did not know they had the issue.<br \/>ii. The organization did know they had the issue but it got buried under tons of other issues!<\/p>\n<p>Every organization is constrained in terms of time and money they can invest in cybersecurity.&nbsp;When the number of issues identified are too large, prioritization becomes the challenge. It boils down to <strong style=\"font-size: 15px; letter-spacing: 0px;\"><em>managing<\/em> risk<\/strong>. For this the first step is<b><\/b><strong><i>identifying<\/i><\/strong> the risks.<\/p>\n<h5>So, what is Risk ?<\/h5>\n<p>The potential for loss, damage, or destruction of an asset as a result of a threat exploiting a vulnerability.&nbsp;Risk&nbsp;is the intersection of assets, threats, and vulnerabilities.<\/p>\n<blockquote>\n<p>Risk is not the enemy \u2013 too much of it is. But very importantly, so is too little of it. Between recklessness and complacency, there is a Goldilocks Zone of risk \u2013 not too much, not too little \u2013 just right.<\/p>\n<footer><cite>Rohit Ghai \u2013 President, RSA<\/cite><\/footer>\n<\/blockquote>\n<h6>How to manage Risk ?<\/h6>\n<p>The process would be to identify vulnerabilities across the organization, model the risk for the identified weakness, prioritize them, and start remediating the top risks \u2013 thereby given the same time and effort, the organizations is de-risking themselves optimally.<\/p>\n<p>Did you know?<\/p>\n<p>Research has shown that organizations suffer 80%<b><\/b>less breaches by adopting a Risk Based Vulnerability Management<b><\/b>model<b>. <\/b><br \/><b>\u2013 Gartner<br \/><\/b><\/p>\n<p><button type=\"button\"><br \/>\u00d7<br \/>Dismiss alert<br \/><\/button><br \/><img decoding=\"async\" src=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/seconizee-e1603114236656.png\" alt=\"\" width=\"160\" height=\"32\"><\/p>\n<h4><strong>&nbsp;DeRisk Center<\/strong><\/h4>\n<ul>\n<li><a style=\"color: #009ee2;\" href=\"https:\/\/seconize.co\">DeRisk Center<\/a> follows a Risk Based Vulnerability Management model.<\/li>\n<li>Identifies asset\u2019s inherent weaknesses by performing a combination of VA, Misconfiguration checks and PT (Penetration Testing). This is the inside out view.<\/li>\n<li>Using <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cyber_threat_intelligence\" target=\"_blank\" rel=\"noopener\"><em>Threat Intelligence<\/em><\/a> identifies the threats from the outside, outside-in view.<\/li>\n<li>Computes likelihood of a breach for each identified weakness.<\/li>\n<li>Further, models the risk objects and scores them.<\/li>\n<li>Builds a prioritized risk register and suggests remediations.<\/li>\n<\/ul>\n<h4 style=\"text-align: center;\">\u2013YOU MAY ALSO LIKE\u2013<\/h4>\n<h3><a href=\"https:\/\/seconize.co\/blog\/assessment-va-pt\/\">Assessment VA PT<\/a><\/h3>\n<p>Risk based Vulnerability Management as the name implies, is identifying vulnerabilities to start with and analyzing the risk associated with the vulnerability.&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;&nbsp;<a href=\"https:\/\/seconize.co\/blog\/assessment-va-pt\/\">[Read more]<\/a><br \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/Assessment-banner1-FINAL-1-e1603457650728-768x437.png\" sizes=\"(max-width: 768px) 100vw, 768px\" srcset=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/Assessment-banner1-FINAL-1-e1603457650728-768x437.png 768w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/Assessment-banner1-FINAL-1-e1603457650728-300x171.png 300w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/Assessment-banner1-FINAL-1-e1603457650728-1024x583.png 1024w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/Assessment-banner1-FINAL-1-e1603457650728-1536x875.png 1536w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/Assessment-banner1-FINAL-1-e1603457650728-2048x1167.png 2048w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/10\/Assessment-banner1-FINAL-1-e1603457650728-600x342.png 600w\" alt=\"\" width=\"768\" height=\"437\"><\/p>\n<h3><a href=\"https:\/\/seconize.co\/blog\/cyber-risk-management\/\">Cyber Risk Management<\/a><\/h3>\n<p>In this new age economy, organizations either <em>get digitized or p<\/em><em>erish<\/em>.<\/p>\n<p><a href=\"https:\/\/seconize.co\/blog\/cyber-risk-management\/\">[Read more]<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/09\/Comicstrip1finalBrandNOW-e1602247585917-1024x514.png\" sizes=\"(max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/seconize.co\/wp-content\/uploads\/2020\/09\/Comicstrip1finalBrandNOW-e1602247585917-1024x514.png 1024w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/09\/Comicstrip1finalBrandNOW-e1602247585917-300x151.png 300w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/09\/Comicstrip1finalBrandNOW-e1602247585917-768x385.png 768w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/09\/Comicstrip1finalBrandNOW-e1602247585917-600x301.png 600w, https:\/\/seconize.co\/wp-content\/uploads\/2020\/09\/Comicstrip1finalBrandNOW-e1602247585917.png 1419w\" alt=\"\" width=\"1024\" height=\"514\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Risk Based Vulnerability Management (or RBVM) is a process by which one evaluates the business risk for an organization resulting from its [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts\/3602"}],"collection":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/comments?post=3602"}],"version-history":[{"count":0,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/posts\/3602\/revisions"}],"wp:attachment":[{"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/media?parent=3602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/categories?post=3602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/worldinformatixbeta.supagrow.in\/wp\/wp-json\/wp\/v2\/tags?post=3602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}