3 Steps to Asset Management and Software Auditing
3 Steps to Asset Management and Software Auditing

With the explosion of laptops, IoT, tablets, smartphones and other smart technologies, endpoints are the single largest group of devices inside your network today. Since they are critical for business getting done, endpoint disruption can have a significant impact on your day to day operations. Protecting them is paramount.

There are four key pillars to building an endpoint security program that does its job well and I detail each of them in my new guide, 4 Essential Strategies to Endpoint Security Protection. These pillars will help you build a solid security foundation that you can then customize to your specific risk profile.

  1. Asset Management
  2. Software Auditing
  3. Vulnerability Management
  4. Dealing with Incidents

Asset management, or effectively enumerating and managing all of your assets, is simply the single most critical control component of security today. If you don’t know what you have, how can you ever begin to properly create defenses for them? In addition to cataloguing your assets, you’ll also want to audit all of the software that runs on them. Unapproved, overused and/or pirated software can add a significant measure of risk to your organization. To manage all of your assets and their software, follow these 3 foundational steps:

Step One: Establish a baseline

  • Collect everything you have on where you stand, from diagrams and network maps to inventory purchases and serial numbers. In this step, you want to shore up any gaps to ensure you have visibility into your endpoint devices, no matter where they are, so that you’ll be able to spot deviations from your baseline.
  • Audit random endpoint devices in different departments to look for common software packages in use by teams, obtain copies of POs and invoices and then look for what’s been missed. Use tools to query your devices and open ports and services used by software packages to easily gather intelligence on what software is installed. Develop master deployment package lists to simplify future endpoint deployments.

Step Two: Refine and maintain your inventory

  • Your baseline is likely going to change almost daily, so you need a way to transition devices in and out of inventory as well as and to monitor for changes.
  • Develop a plan for exceptions, including legacy applications and special applications. One-off applications still need to be ‘owned’ and managed, with some measure of control over the risks. Develop a map of regular application use (ports used, ‘call home’ patterns) so you can spot anomalies, which could be incidents in their nascent stages.

Step Three: Introduce automation, integration and alerting

  • The ideal asset management strategy will offload as much of the scanning as possible to automated and semi-automated tools to keep an eye on your network, inventory and asset documentation and to generate alerts or automated actions when something out of the ordinary pops up.
  • Use automation to roll updates and patches into your standard images to help you monitor for compliance. Integrating with other security tools such as your SIEM and NGFW can help build a better picture of your overall risk or alert to incidents.

Stay tuned for our next post that will explore the final two foundations of endpoint security, Vulnerability Management and Dealing with Incidents or download the guide now to get started on your endpoint security strategy.

Essential strategies cta

ABOUT THE AUTHOR

Richard Henderson
Richard Henderson is global security strategist at Absolute Software where he is responsible for spotting trends, watching industries and creating ideas. He has nearly two decades of experience and involvement in the global hacker community. He is a researcher and regular presenter at conferences, and skilled electronics hacker. He was one of the first researchers in the world to defeat Apple's TouchID fingerprint sensor on the iPhone 5S. Richard was a technical editor of a book on IoT Security: RIoT Control: Understanding and Managing Risks and the Internet of Things. He is currently co-authoring the second edition of Cybersecurity for Industrial Control Systems.


0 COMMENTS

Leave a Reply

Your email address will not be published.