CYBERSECURITY AND PROCESSES: MODERN SECOPS PROCESSES – VULNERABILITY RESPONSE AND SECURITY INCIDENT RESPONSE
DOI:
https://doi.org/10.32782/IT/2025-1-33Keywords:
Cybersecurity, SecOps, IT assets, vulnerabilities, security incidents, cyber processes.Abstract
Over the past decades, cybersecurity and the protection of data and software have become increasingly important. Initially, they started with simple tools such as antivirus programs and backup systems without any formal processes. Today, they have evolved into standards for security practices like Vulnerability Response and Security Incident Response, collectively known as SecOps (Security Operations). This rapid progress in cybersecurity can be attributed to the widespread adoption of technology and easy access to knowledge, occurring within a limited timeframe for their deep assimilation and adaptation to societal needs. Modern cybersecurity relies on complex processes that are practically integral to business operations and systems. This integration allows for faster detection and blocking of unauthorized access, promoting more effective vulnerability and incident management, and creating a more secure business environment. Objective. The article is dedicated to the analytical review of modern security processes implemented by cybersecurity specialists to protect all IT assets in international-level businesses and government institutions with the aim of improving their effectiveness. The stages of vulnerability and security incident response have been analyzed, allowing for the identification of opportunities to enhance the effectiveness of individual stages. In particular, it is suggested to improve the stages of diagnosing potential vulnerability channels of IT assets through the use of specialized algorithms for analyzing interrelationships. Methodology. A comprehensive approach was applied in the study, which includes the analysis of existing methods for managing cybersecurity, particularly the processes of vulnerability and security incident response. A detailed examination of current principles and algorithms for analyzing IT asset vulnerabilities was conducted, which allowed for identifying opportunities to enhance the effectiveness of these processes. Scientific novelty. The scientific novelty of the research lies in the proposal to create and use vulnerability analysis algorithms not only for IT assets themselves but also for the relationships between them, considering both technological and organizational aspects of asset interaction in the context of cyber threats. The article also suggests integrating vulnerability and security incident response processes to ensure more timely detection and mitigation of threats. Conclusions. Effective response to security incidents and vulnerabilities is critical to ensuring the integrity and security of information systems. The proposed diagnostic model, which includes not only scanning IT assets for vulnerabilities but also analyzing the relationships between them, significantly enhances the effectiveness of detecting potential threats. The importance of this approach lies in its ability to more deeply assess the risks and impacts of vulnerabilities, which in turn supports the timely and informed decision-making process to minimize cyber threats.
References
Rosa Iglesias, Angel Longueira-Romero. Vulnerability Detection and Response: Current Status and New Approaches. CyberSecurity in a DevOps Environment: From Requirements to Monitoring. 2023. C. 95–125. DOI:10.1007/978-3-031-42212-6_4
Шевчук М. О. Основні аспекти механізму забезпечення інформаційної безпеки підприємницької діяльності. Науковий вісник Ужгородського Національного Університету. 2024. С. 181–186. https://doi.org/10.24144/2307-3322.2024.85.3.28
Cybersecurity Incident & Vulnerability Response Playbooks. URL: https://www.cisa.gov/sites/default/files/2024-08/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf (дата звернення 13.10.2024)
Vulnerability Response in ServiceNow and SecOps Maturity Model. URL: https://www.youtube.com/watch?v=CiU5YrKi7zg (дата звернення 14.10.2024)
Yousefnezhad N., Costin A. Understanding SBOMs in Real-World Systems – A Practical DevOps/SecOps Perspective. In International Symposium on Business Modeling and Software Design. 2024. (pp. 293–304). Cham: Springer Nature Switzerland.