Q1. What exactly does Qualys' recently announced first-party software risk management product allow organizations to do? What business or security issue will it help them address?
Effective risk assessment is the bedrock of security; this process is especially important for custom, first-party applications, and their open-source components. As companies develop their own software to meet specific requirements, the importance of a unified approach to security assessments increases. Unfortunately, risk assessments for first-party applications rarely go through the same lifecycle management of vulnerabilities from discovery to prioritization to remediation – the same process used for third-party applications. When first-party assessments are done, they often rely on disjointed, standalone tools owned and managed by different teams. As a result, effective risk management in such disparate environments becomes an impossible task, which means first-party applications are likely to be exposed to risks that are “unseen” by SecOps teams.
The Qualys Cloud Platform now includes new capabilities for assessing risks in first-party applications. Customers can “bring their own” assessment and remediation logic into Qualys Vulnerability Management, Detection and Response (VMDR) workflows and reporting, providing SecOps teams with a unified view of all first- and third-party applications along with open-source software in their environment.
Our announcement also addresses reducing supply chain risks automatically with Runtime Software Composition Analysis (SCA). These risks pertain to the surging use of open-source components during application development, which has increased the risk of exploitation of vulnerabilities within them. Related risks for the software supply chain are now a significant source of concern, as evidenced by recent attacks on MOVEit, 3CX, Log4j, SolarWinds, and others.
In response to this challenge, Qualys has added a new capability for VMDR to detect, manage, and reduce the risk of software supply chain vulnerabilities in the production environment. SCA provides continuous and real-time visibility of both open-source and commercial software components present in production of both first-party and third-party applications. Visibility into a customer’s software supply chain allows proactive action against potential risks and emerging threats.
Q2. A recent Qualys study showed that misconfigurations remain the biggest risk to enterprise cybersecurity in cloud environments. Why does that continue to be the case? What do security leaders need to understand about the shared-responsibility model?
Cloud misconfiguration is the most critical issue for securing cloud environments. Configurations refer to control settings applied to both hardware and software elements within a cloud environment that allow them to interoperate and communicate. Accurate maintenance of configurations is the user-organization’s responsibility for cloud – for their apps and data.
Cloud service providers focus on securing the supporting infrastructure in the shared responsibility model. User misconfigurations amplify the risk of data breaches and unauthorized access due to many factors: complexity of cloud environments, lack of expertise in keeping up with evolving technologies, human error leading to insecure settings and permissions, rapid deployment that compromises implementation of security measures, and the dynamic nature of cloud environments hindering visibility and control of cloud-resident unencrypted or sensitive data. Failure to get control of these security “cracks” can quickly open a cloud environment and expose sensitive data and resources to attackers.
As described in the 2023 Qualys TotalCloud Security Insights whitepaper, organizations should harden CSP configuration controls with Center for Internet Studies (CIS) Benchmarks. These controls are the gold standard for hardening configurations in CSP environments and demonstrating compliance for auditors. CIS controls are the bare minimum you should have in place for basic cloud security hygiene. However, scans for these controls are failing 34% of the time for Amazon Web Services, 57% for Microsoft Azure, and 60% for Google Cloud Platform. The following recommendations should be Priority #1 for every organization:
- Organizations should assess the effectiveness of their CIS controls and correct misconfigurations that may inadvertently make assets public.
- Implement least-privilege multifactor authentication for all identities.
- Use strong passwords for all identities.
- Protect sensitive data by enabling end-to-end encryption with self-generated keys.
- Harness the potential of the CIS mapping in conjunction with MITRE ATT&CK tactics and techniques, as this approach provides invaluable insights and boosts the prioritization of hardening controls in cloud environments.
Q3. What does Qualys hope to accomplish at SecTor 2023? What is your main messaging at the event?
Qualys plans to share its SecTor 2023 theme of “Get More Security in a Single Platform” as an event exhibitor at Booth D700, through a general session presentation, a general panel discussion, and 11 in-booth presentations.
The Qualys Cloud Platform gives you a continuous, always-on assessment of your global IT, security, and compliance posture. It provides 2-second visibility across all your IT assets, wherever they reside. And with automated, built-in threat prioritization, patching, and other response capabilities, the platform is a complete, end-to-end security solution. The platform consolidates traditionally siloed solutions so you can avoid the cost and complexities that come with managing multiple security vendors. Qualys Cloud Platform automatically gathers and analyzes IT, security, and compliance data in a scalable, state-of-the-art backend. Provisioning any of Qualys’ natively integrated security and compliance apps - twenty and counting - is as easy as checking a box.
Attendees should stop by the Qualys Booth (D700) where they will learn how to Get More Security with our latest Qualys solutions. Hear from our experts, see demos, and meet 1:1 with a Qualys expert. In addition, Qualys vice president, product management, Mehul Revankar, will present a general session on “Navigating the Threat Landscape Through the Attacker’s Lense and Building a Robust Defense.” And, Corey Smith, vice president, Solution Architects, will participate in a Cloud Security Summit panel on “How AI and Technology are Partnering to Deal with Current Cybersecurity Challenges.”