I work for a University with a decentralized IT department: each college, division, department, etc maintains their users. As a security department who maintains QualysGuard, we were wanting each department to scan their own assets and re-mediate all vulnerabilities found in these scans based on the following policy:
- Level 4 and Level 5 vulnerabilities must be re-mediated within 15 days
- Level 3 vulnerabilities must be re-mediated within 30 days
- Level 2 vulnerabilities must be re-mediated within the next semesters
- Level 1 vulnerabilities must be re-mediated whenever possible
WIth this policy in mind, we began rolling out our QualysGuard service using the following methods. We would create Asset Groups for each group of servers that belong to one of the following: a department, college, division, application group, etc. Each Asset Group would be additionally subdivided into each network core. For example, if you have a Athletics department, they may have assets in all the different network cores (Faculty/Staff Network, Data Center, DMZ, Residential Network, etc.). Because each of these departments will have multiple assets in multiple network cores, we relied heavily on our naming conventions. Our naming convention is the following for Asset Groups: CAMPUS DEPT NETWORK Assets (SCANNER NAME) -> CAMPUS Athletics DC Assets (DC_SCANNER)
When dealing with QualysGuard in a decentralized IT infrastructure, your naming convention will save you!
Continue reading