blog

Vulnerability management – Decision trees, risk-based vulnerability prioritization

Prioritising vulnerabilities for application security and cloud security is becoming more and more the norm, and risk-based vulnerability prioritization is being debated in the industry against some new innovative approaches utilizing decision trees. With critical vulnerabilities being exploited in 3-15 days and business security teams being continuously overstretched, it is more important than ever to be efficient and effective in what to fix. 

Vulnerability management - Decision trees, risk-based vulnerability prioritization SSVC alternative
Making decisions with decision trees vs risk-based approaches

In recent research, only a small number of CVEs were exploitable  (10-15%), and the number of vulnerabilities reported yearly is increasing 35% annually.

vulnerability exploitation over time risk based vulnerability SSVC alternative

Although the Common Vulnerability Scoring System (CVSS) has served as the base method for vulnerability fixes for years, it is important to remember that CVSS measures severity, not risk. A risk-based approach enables product security and engineering teams to make more focused decisions, communicate efficiently with the rest of the organization, and prioritize vulnerabilities based on location, the likelihood of exploitation, and business impact.

Nonetheless, CVSS can be referred to as severity, not risk. A risk-based approach (details can be seen in security risk formula) on vulnerabilities from code to cloud-enable product security and engineering team to:

  • Make more focused decisions
  • Communicate efficiently with the rest of the organization on risk 
  • Prioritise vulnerabilities based on location, the likelihood of exploitation and business impact

 What is risk

what is risk-based vulnerability management and risk based prioritization of vulnerabilities
Risk-based vulnerability factors

Risk can be described as the potential impact on business operations or assets and the likelihood of exploitation. In cybersecurity, risk assessment helps organizations determine which vulnerabilities pose the greatest threat and should be addressed first.

What is risk-based vulnerability prioritization?

“ Security and risk leaders should tie vulnerability management practices to their organization’s specific needs, not a mythical standard.” Gartner 

what is risk-based vulnerability management and
what is risk-based vulnerability management and risk-based prioritization of vulnerabilities

Risk specified in this way is extensible and allows to include in Probability, impact and severity several factors that can then be scaled and expanded, offering a consistent and quantifiable unbiased view across the entire organization.

Those methodologies can be applied fro software and application security as well as infrastructure security and cloud security.

The above risk levels can also be scaled easily with aggregation into several layers and form the risk for application, environment, business units and so on, making it a prime tool for 

Detailed specifications on risk formula is available at  security risk formula 

As long as the organization keep a transparent approach to how the elements of the risk are being calculated

What are decision trees? 

Decision trees are a graphical representation of various decisions and their corresponding outcomes. They help security teams visualize and evaluate complex decision-making processes by breaking them down into smaller, manageable steps.

Following an Example of decision trees for Business impact analysis vulnerability prioritization

Decision tree based on business criticality application security, cloud security vulnerability
Decision tree based on business criticality application security, cloud security vulnerability

Following another example of decision trees for vulnerability prioritisation (arrow pointing from the previous diagram)

Decision tree based on Vulnerability factors

SSVC from cisa

SSVC vulnerability management decision tree
CISA SSVC decision tree for vulnerability

The SSVC (System and Services Visibility and Control) program is a cybersecurity initiative developed by the Cybersecurity and Infrastructure Security Agency (CISA) to help organizations improve their cybersecurity posture by increasing visibility into their systems and networks, and enabling better control over them. For more details refer to the Detailed guidance.

The SSVC program aims to provide organizations with guidelines and best practices for implementing security controls that help them detect and respond to cyber threats more effectively. These controls are organized into system and communications protection, access control, and incident response.

To use the SSVC program, organizations can refer to the SSVC guide that was mentioned earlier. The guide provides detailed descriptions of the security controls recommended for each category and guidance on implementing and maintaining them. Organizations can use this information to assess their security posture, identify areas where they need to improve and implement the recommended controls to protect their systems and data better.

When implementing the SSVC controls, organizations should consider several decision parameters, such as the level of risk they are willing to accept, the cost and complexity of implementing the controls, and the impact they may have on their operations. For example, organizations may choose to implement more stringent controls in high-risk areas, such as systems that store sensitive data or control critical infrastructure, while implementing more relaxed controls in lower-risk areas.

The CISA SSVC program provides organizations a useful framework for improving their cybersecurity posture and protecting their systems and data from cyber threats. By following the guidelines and best practices outlined in the SSVC guide, organizations can reduce the risk of cyber-attacks and increase their overall resilience to cyber threats.

Other considerations of decision trees can be found here

Advantages and disadvantages

By understanding the advantages and drawbacks of each method, organizations can make an informed decision on which approach best suits their needs for prioritizing vulnerabilities and enhancing their cybersecurity posture.

As a product security and vulnerability management team, you want to be consistent but collaborative. 

A method that relies on strict rules is bound to fail as enterprise organizations and decision-making are wild and change consistently.

Nonetheless, a too-loose or undocumented method might result in chaos and wildly different decision methods. 

A combination of risk-based decisions and decision trees based on risk factors is the optimal method as it relies on an objective view of the risk plus a decision method that allows flexibility and exceptions.

Decision TreesRisk-BasedMixed Risk-based and Decision three
ProSimple to explain, facilitating communication among team members.
Consistent, ensuring uniformity in the decision-making process.
Accounts for probability, offering a more comprehensive assessment of risk.Allows for adjustment of weights for various factors, providing flexibility in the evaluation process.
Transparent decisions can be overridden, enabling organizations to adapt to change circumstances.
Supports linear logic (accept/record/defer), streamlining decision-making.
Combines the strengths of both Decision Trees and Risk-Based Scoringoffering a more holistic approach.
Transparent decisions can be overridden, ensuring flexibility in decision-making.
Supports linear logic (accept/record/defer), optimizing the decision process.
ConIt does not account for probability, potentially overlooking important risk factors.
Difficult to scale, as the complexity increases with more decisions and outcomes.
Binary decisions limit the scope of possible outcomes. Subjective to the creator, which can introduce bias or subjectivity.
Decisions not always binary, complicating the process in certain situations.Requires a formula, which may be challenging for some team members to understand.Requires a more advanced maturity level, which may be challenging for some organizations to achieve. Business criticality and other elements can be difficult to determine, necessitating specific methods to specify. It can be hard to explain, requiring justification and trust in the model. Some factors are hidden in the calculation, necessitating verification and trust in the model.

Additional considerations

When comparing decision trees and risk-based prioritization, it is essential to consider the strengths and weaknesses of each approach. The table below outlines the key differences between these two methods:

CriteriaDecision TreeRisk-based Prioritization
VisualisationProvides visualisation of decisionsCan lack graphical decision representation
ComplexitySimplifies complex decisionsCan handle complex situations
CollaborationEncourage team collaborationIt may require more communication on risk and detailed visualisation on what are the factors influencing risk
ScopeLimited to predefined scenariosMore adaptable to various situations and extendible
PrecisionMay oversimplify decisionsConsider a wide range of factors, easy to extend and scale
SubjectivitySubject to the creator’s expertise and biasRelies on objective risk assessment and data
WeightsDoes not support weight in decision makingSupports weight in deciding what to fix and which parameter to weigh 
Decision tree vs Risk-based prioritization of vulnerabilities

Conclusion 

In summary, decision trees offer a simplified, visual approach to decision-making that encourages collaboration but may be limited in scope and susceptible to subjectivity. On the other hand, risk-based prioritization enables organizations to assess vulnerabilities based on a wider range of factors and adapt to various situations. However, it may lack the graphical representation that decision trees provide and may require additional communication effort within the team. Ultimately, organizations should weigh the pros and cons of each method and determine which approach best fits their specific needs and circumstances.

Using decision trees and risk-based prioritization enables product security teams to:

  • Communicate consistently and effectively about platform risk across the organization.
  • Address vulnerabilities efficiently and effectively.
  • Make informed decisions on vulnerability prioritization.

How Phoenix Security Can Help:

SSVC vulnerability phoenix security application security and cloud security vulnerability management decision trees

Phoenix Security is a platform that collects information from various sources, contextualizes, and prioritizes vulnerabilities from code to cloud.

If you want to know more about Phoenix security and doing vulnerability management at scale, contact us https://phoenix.security/request-a-demo/ 

Get an overview of your asset lineage

risk based vulnerability phoenix security application security and cloud security vulnerability management decision trees
Phoenix Security Risk-based vulnerability prioritization transparent risk formula

Phoenix risk calculation enables automatic prioritization of vulnerabilities using multiple data points and assessing quickly based on context, providing box Cyber threat intelligence. All data points from phoenix security are transparently shown to enable risk-based prioritization. Phoenix security risk provides decision data points and risk-scoring methods, enabling organizations to make informed decisions regarding their cybersecurity strategy. By leveraging Phoenix Security’s comprehensive platform, organizations can streamline their vulnerability management and better protect their digital assets.

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Discover and fix CVE-2024-3094 vulnerability affecting Linux distributions liblzma, part of the xz package, Fedora, openSUSE, Debian, and Kali. Get the latest updates, fixes, and security recommendations to safeguard your system against unauthorized access through compromised XZ Utils. Protect and discover the affected system with ASPM, Application security Posture management
Francesco Cipollone
Explore the interplay between the MITRE ATT&CK framework and EPSS for effective vulnerability management. Learn how these tools help predict and prioritize cyber threats, with deep dives into the most and least exploited techniques. Stay ahead in cybersecurity with Phoenix’s advanced analysis.
Francesco Cipollone

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.