Automated Vulnerability Assignment in DSPs Network to Reduce Remediation Time by 50%

August 12, 2019

Cyber-attacks against Digital Service Providers’ (DSPs) critical infrastructure are soaring. In 2019, massive telecommunication data breach was uncovered which was caused by a group of Chinese hackers who attacked 10 DSPs across the globe, exploiting their network’s vulnerabilities. GSMA’s Mobile Telecommunications Security Threat Landscape report 2019 says that there was a 55% increase in breaches caused by vulnerable Open-Source software. Addressing security vulnerabilities is a top priority for DSPs because a successful cyber-attack could essentially cause disruption in service for millions of customers, loss of customers’ trust, deterioration of DSP’s brand & reputation and shut-down of operations. Addressing security threats will require DSPs to establish a systematic process for vulnerability management with high levels of automation, to discover new vulnerabilities, perform a risk assessment and assign the vulnerabilities to the right support group to facilitate quicker remediation. Depending on the DSP’s size, infrastructure size & complexity and state of the configuration management database (CMDB), finding the responsible asset owner may prove to be a highly challenging and cumbersome task, resulting in lead times of up to many weeks.

This insight provides a solution approach encompassing

  • Discovery scan
  • Element Management Systems (EMS) integration
  • Central validation & CMDB data enrichment tool

Vulnerability management involves vulnerability scanning & assigning the identified vulnerabilities to the appropriate support groups for remediation

DSP’s can reduce their vulnerability assignment lead time by up to 80% and improve their right-first-time assignment close to 75% by leveraging the solution approach unveiled in this insight.

Topics Covered:

  • Vulnerability Management Process overview
  • What makes Vulnerability analysis & assignment the most cumbersome task for DSPs?
  • Solution approach for right-first-time vulnerability assignment
  • Building a Central validation & CMDB data enrichment to ensure attributes & relationship data are correct for right-first-time vulnerability assignment

 

Authors:
  • Reza Nanoha
  • Sathya Narayanan

Connect with Us

We're ready to help your business grow. Let's talk about what service is right for you.

I'd like to be contacted by Prodapt about related services

Connect with Us

We are ready to help your business grow. Let us talk about what service is right for you.

I'd like to be contacted by Prodapt about related services

Thank you for your interest.

Our team shall connect with you shortly.

Log in with your credentials

Forgot your details?