Initial commit
This commit is contained in:
225
skills/devsecops/container-grype/references/cisa_kev.md
Normal file
225
skills/devsecops/container-grype/references/cisa_kev.md
Normal file
@@ -0,0 +1,225 @@
|
||||
# CISA Known Exploited Vulnerabilities (KEV) Catalog
|
||||
|
||||
CISA's Known Exploited Vulnerabilities (KEV) catalog identifies CVEs with confirmed active exploitation in the wild.
|
||||
|
||||
## Table of Contents
|
||||
- [What is KEV](#what-is-kev)
|
||||
- [Why KEV Matters](#why-kev-matters)
|
||||
- [KEV in Grype](#kev-in-grype)
|
||||
- [Remediation Urgency](#remediation-urgency)
|
||||
- [Federal Requirements](#federal-requirements)
|
||||
|
||||
## What is KEV
|
||||
|
||||
The Cybersecurity and Infrastructure Security Agency (CISA) maintains a catalog of vulnerabilities that:
|
||||
1. Have **confirmed active exploitation** in real-world attacks
|
||||
2. Present **significant risk** to federal enterprise and critical infrastructure
|
||||
3. Require **prioritized remediation**
|
||||
|
||||
**Key Points**:
|
||||
- KEV listings indicate **active, ongoing exploitation**, not theoretical risk
|
||||
- Being in KEV catalog means attackers have weaponized the vulnerability
|
||||
- KEV CVEs should be treated as **highest priority** regardless of CVSS score
|
||||
|
||||
## Why KEV Matters
|
||||
|
||||
### Active Threat Indicator
|
||||
|
||||
**KEV presence means**:
|
||||
- Exploit code is publicly available or in active use by threat actors
|
||||
- Attackers are successfully exploiting this vulnerability
|
||||
- Your organization is likely a target if running vulnerable software
|
||||
|
||||
### Prioritization Signal
|
||||
|
||||
**CVSS vs KEV**:
|
||||
- CVSS: Theoretical severity based on technical characteristics
|
||||
- KEV: Proven real-world exploitation
|
||||
|
||||
**Example**:
|
||||
- CVE with CVSS 6.5 (Medium) but KEV listing → **Prioritize over CVSS 9.0 (Critical) without KEV**
|
||||
- Active exploitation trumps theoretical severity
|
||||
|
||||
### Compliance Requirement
|
||||
|
||||
**BOD 22-01**: Federal agencies must remediate KEV vulnerabilities within specified timeframes
|
||||
- Many commercial organizations adopt similar policies
|
||||
- SOC2, PCI-DSS, and other frameworks increasingly reference KEV
|
||||
|
||||
## KEV in Grype
|
||||
|
||||
### Detecting KEV in Scans
|
||||
|
||||
Grype includes KEV data in vulnerability assessments:
|
||||
|
||||
```bash
|
||||
# Standard scan includes KEV indicators
|
||||
grype <image> -o json > results.json
|
||||
|
||||
# Check for KEV matches
|
||||
grep -i "kev" results.json
|
||||
```
|
||||
|
||||
**Grype output indicators**:
|
||||
- `dataSource` field may include KEV references
|
||||
- Some vulnerabilities explicitly marked as CISA KEV
|
||||
|
||||
### Filtering KEV Vulnerabilities
|
||||
|
||||
Use the prioritization script to extract KEV matches:
|
||||
|
||||
```bash
|
||||
./scripts/prioritize_cves.py results.json
|
||||
```
|
||||
|
||||
Output shows `[KEV]` indicator for confirmed KEV vulnerabilities.
|
||||
|
||||
### Automated KEV Alerting
|
||||
|
||||
Integrate KEV detection into CI/CD:
|
||||
|
||||
```bash
|
||||
# Fail build on any KEV vulnerability
|
||||
grype <image> -o json | \
|
||||
jq '.matches[] | select(.vulnerability.dataSource | contains("KEV"))' | \
|
||||
jq -s 'if length > 0 then error("KEV vulnerabilities found") else empty end'
|
||||
```
|
||||
|
||||
## Remediation Urgency
|
||||
|
||||
### BOD 22-01 Timeframes
|
||||
|
||||
CISA Binding Operational Directive 22-01 requires:
|
||||
|
||||
| Vulnerability Type | Remediation Deadline |
|
||||
|-------------------|---------------------|
|
||||
| KEV listed before directive | 2 weeks from BOD publication |
|
||||
| Newly added KEV | 2 weeks from KEV addition |
|
||||
| Critical KEV (discretionary) | Immediate (24-48 hours) |
|
||||
|
||||
### Commercial Best Practices
|
||||
|
||||
**Recommended SLAs for KEV vulnerabilities**:
|
||||
|
||||
1. **Immediate Response (0-24 hours)**:
|
||||
- Assess exposure and affected systems
|
||||
- Implement temporary mitigations (disable feature, block network access)
|
||||
- Notify security leadership and stakeholders
|
||||
|
||||
2. **Emergency Patching (24-48 hours)**:
|
||||
- Deploy patches to production systems
|
||||
- Validate remediation with re-scan
|
||||
- Document patch deployment
|
||||
|
||||
3. **Validation and Monitoring (48-72 hours)**:
|
||||
- Verify all instances patched
|
||||
- Check logs for exploitation attempts
|
||||
- Update detection rules and threat intelligence
|
||||
|
||||
### Temporary Mitigations
|
||||
|
||||
If immediate patching is not possible:
|
||||
|
||||
**Network-Level Controls**:
|
||||
- Block external access to vulnerable services
|
||||
- Segment vulnerable systems from critical assets
|
||||
- Deploy Web Application Firewall (WAF) rules
|
||||
|
||||
**Application-Level Controls**:
|
||||
- Disable vulnerable features or endpoints
|
||||
- Implement additional authentication requirements
|
||||
- Enable enhanced logging and monitoring
|
||||
|
||||
**Operational Controls**:
|
||||
- Increase security monitoring for affected systems
|
||||
- Deploy compensating detective controls
|
||||
- Schedule emergency maintenance window
|
||||
|
||||
## Federal Requirements
|
||||
|
||||
### Binding Operational Directive 22-01
|
||||
|
||||
**Scope**: All federal civilian executive branch (FCEB) agencies
|
||||
|
||||
**Requirements**:
|
||||
1. Remediate KEV vulnerabilities within required timeframes
|
||||
2. Report remediation status to CISA
|
||||
3. Document exceptions and compensating controls
|
||||
|
||||
**Penalties**: Non-compliance may result in:
|
||||
- Required reporting to agency leadership
|
||||
- Escalation to Office of Management and Budget (OMB)
|
||||
- Potential security authorization impacts
|
||||
|
||||
### Extending to Commercial Organizations
|
||||
|
||||
Many commercial organizations adopt KEV-based policies:
|
||||
|
||||
**Rationale**:
|
||||
- KEV represents highest-priority threats
|
||||
- Federal government invests in threat intelligence
|
||||
- Following KEV reduces actual breach risk
|
||||
|
||||
**Implementation**:
|
||||
- Monitor KEV catalog for relevant CVEs
|
||||
- Integrate KEV data into vulnerability management
|
||||
- Define internal KEV remediation SLAs
|
||||
- Report KEV status to leadership and audit teams
|
||||
|
||||
## Monitoring KEV Updates
|
||||
|
||||
### CISA KEV Catalog
|
||||
|
||||
Access the catalog:
|
||||
- **Web**: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
|
||||
- **JSON**: https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
|
||||
- **CSV**: https://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv
|
||||
|
||||
### Automated Monitoring
|
||||
|
||||
Track new KEV additions:
|
||||
|
||||
```bash
|
||||
# Download current KEV catalog
|
||||
curl -s https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json \
|
||||
-o kev-catalog.json
|
||||
|
||||
# Compare against previous download
|
||||
diff kev-catalog-previous.json kev-catalog.json
|
||||
```
|
||||
|
||||
**Subscribe to updates**:
|
||||
- CISA cybersecurity alerts: https://www.cisa.gov/cybersecurity-alerts
|
||||
- RSS feeds for KEV additions
|
||||
- Security vendor threat intelligence feeds
|
||||
|
||||
## Response Workflow
|
||||
|
||||
### KEV Vulnerability Detected
|
||||
|
||||
Progress:
|
||||
[ ] 1. **Identify** affected systems: Run Grype scan across all environments
|
||||
[ ] 2. **Assess** exposure: Determine if vulnerable systems are internet-facing or critical
|
||||
[ ] 3. **Contain** risk: Implement temporary mitigations (network blocks, feature disable)
|
||||
[ ] 4. **Remediate**: Deploy patches or upgrades to all affected systems
|
||||
[ ] 5. **Validate**: Re-scan with Grype to confirm vulnerability resolved
|
||||
[ ] 6. **Monitor**: Review logs for exploitation attempts during vulnerable window
|
||||
[ ] 7. **Document**: Record timeline, actions taken, and lessons learned
|
||||
|
||||
Work through each step systematically. Check off completed items.
|
||||
|
||||
### Post-Remediation Analysis
|
||||
|
||||
After resolving KEV vulnerability:
|
||||
|
||||
1. **Threat Hunting**: Search logs for indicators of compromise (IOC)
|
||||
2. **Root Cause**: Determine why vulnerable software was deployed
|
||||
3. **Process Improvement**: Update procedures to prevent recurrence
|
||||
4. **Reporting**: Notify stakeholders and compliance teams
|
||||
|
||||
## References
|
||||
|
||||
- [CISA KEV Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
|
||||
- [BOD 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities](https://www.cisa.gov/news-events/directives/bod-22-01-reducing-significant-risk-known-exploited-vulnerabilities)
|
||||
- [KEV Catalog JSON Feed](https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json)
|
||||
- [CISA Cybersecurity Alerts](https://www.cisa.gov/cybersecurity-alerts)
|
||||
Reference in New Issue
Block a user