Kuboid
Open Luck·Kuboid.in
Security BSides2023
Open in YouTube ↗

Solving the People Problems in Your VMDR Program

BSidesSLC28 views21:16over 2 years ago

This talk addresses the organizational and human-centric challenges inherent in implementing a Vulnerability Management, Detection, and Response (VMDR) program. It emphasizes that while modern security tools can automate scanning and patching, the primary obstacles to success are often cultural, such as resistance from IT and development teams. The speaker advocates for shifting from a punitive, blame-oriented culture to one that incentivizes security through alignment with business goals and improved cross-departmental communication.

Why Your Patch Management Program Is Failing (And How to Fix It)

TLDR: Most vulnerability management programs fail not because of the tools, but because of the people operating them. By shifting from a blame-heavy, manual culture to one that aligns security goals with business incentives, teams can actually get patches deployed. This post breaks down how to stop fighting your IT and dev teams and start getting them to work with you.

Security researchers and penetration testers spend their lives hunting for the "perfect" exploit. We obsess over zero-days, bypasses, and complex chain attacks. Yet, when we walk into a client environment, the most common way in isn't a sophisticated RCE or a clever logic flaw. It is a missing patch for a vulnerability that has been public for months, or even years. We see the same OWASP Top 10 issues year after year because the underlying process for fixing them is broken.

The industry loves to talk about "vulnerability management" as if it is a software problem. We buy Tenable, Qualys, or Rapid7 and assume the job is done. But software only identifies the problem. It does not fix it. The real bottleneck is the human element. If your IT and development teams view your security program as a source of friction, they will find ways to ignore it.

The Myth of the Magic Patch Button

Automation is the standard answer for everything in security, but it is not a silver bullet for patching. Yes, you can use Microsoft Intune, Jamf, or JumpCloud to push updates. These tools are excellent at automating the "next-next-finish" cycle of an installation. However, they cannot solve the "what if" scenarios that keep sysadmins awake at night.

What if the patch breaks the application? What if it corrupts the database? What if the server requires a reboot during a critical business window? These are not technical problems. These are risk management problems. When you force a patch without addressing these concerns, you are not doing security. You are creating a denial-of-service condition for your own company.

Stop Blaming, Start Enabling

The biggest mistake security teams make is positioning themselves as the "no" department. We send out a report, point to a CVE entry on NVD, and demand a fix. When the fix doesn't happen, we blame the IT team for being lazy or incompetent. This is a losing strategy.

If you want to be effective, you have to change the conversation. Stop talking about bits and bytes. Start talking about business value. When you approach a stakeholder, don't lead with the CVSS score. Lead with the risk to the business and the cost of inaction. If you can demonstrate that a specific patch reduces the likelihood of a breach that would cost the company six figures, you change the dynamic. You are no longer a nuisance; you are a partner in protecting the company's bottom line.

The Art of the Small Win

Large organizations often treat patching like a massive, monolithic project. They try to boil the ocean, and they fail. Instead, break the work down. If you are struggling to get traction, start with the low-hanging fruit. Focus on the systems that are easiest to patch and have the highest impact.

Document your wins. When you successfully patch a critical vulnerability, make sure the business knows. Use that success to build political capital. When you have that capital, you can start asking for the resources—like additional head count or better infrastructure—that you need to tackle the harder, more complex systems.

Why Your Users Won't Reboot

We often complain about users who refuse to reboot their machines. We call them the problem. But look at it from their perspective. They have a meeting in three minutes. They have a deadline. They are trying to get work done. If your patching process interrupts them at the worst possible time, they will find a way to bypass it.

If you want compliance, you have to provide an incentive. Maybe that means scheduling reboots during off-hours, or providing a "snooze" button that actually works, or simply communicating the schedule clearly so they aren't blindsided. If you make the secure way the easiest way, people will follow it. If you make it the hardest way, they will fight you every step of the way.

Building a Sustainable Program

Ultimately, a successful vulnerability management program is built on relationships. You need to know the people who own the systems you are trying to patch. You need to understand their pressures and their constraints. When you treat them with respect and work to solve their problems, they will work to solve yours.

The next time you are on an engagement, don't just look for the exploit. Look at the process that allowed the vulnerability to exist in the first place. Is it a lack of tools? Probably not. It is almost certainly a lack of communication, a lack of incentives, or a culture of blame. If you can help your clients fix those human problems, you will do more for their security than any exploit ever could.

Security is a marathon, not a sprint. You don't need to fix everything today. You just need to be better than you were last week. Keep pushing, keep communicating, and keep building those relationships. That is how you actually move the needle.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in