Cybersecurity is complex — anticipating cybersecurity events is another challenge altogether.
We could argue that most events can be described by some probabilistic phenomenon, but attempting to define that phenomenon is where things get tricky.
IT environment exposure presents real risks, but mathematically (or statistically), we can only aim to describe the likelihood of a cyberattack by accounting for a finite set of factors. As systems and their behavior become more complex, it also becomes far more challenging to describe their behavior with objective certainty.
While this could apply to any IT operations process, today we’re talking specifically about the process of addressing vulnerabilities. We can only know the vulnerabilities we know, and we can only guess which ones are likely to present genuine threats to our systems in the near future.
In other words, we’re often being asked to solve the puzzle with only a fraction of the pieces. Thankfully, the sheer scope of this problem has brought cybersecurity professionals together in search of those missing pieces — that’s where EPSS comes in, let’s break it down.
Started in 2019, Exploit Prediction Scoring System (EPSS) is an open community-driven effort to model and manage vulnerability risk from a probabilistic perspective. EPSS is governed by the Forum of Incident Response and Security Teams (FIRST), a team responsible for a number of vulnerability scoring protocols.
According to research, businesses and technology vendors fixonly 5-20% of vulnerabilities every month. Yet, only 2-7% of vulnerabilities are ever exploited. But which ones exactly? Since we cannot be sure which vulnerabilities need to be managed first, and since we cannot fix them all immediately, we need to prioritize.
This is what the EPSS is designed to achieve: a community initiative where each discovered vulnerability gets a probability score 0-1 (0-100%), corresponding to the probability it may be exploited within the next 30 days. EPSS attempts to categorize Common Vulnerabilities and Exposures (CVEs) through aggregation and analysis of prior knowledge.
EPSS takes data from multiple sources ranging from vendor reports to data published by researchers and white hat hackers. The ground truth, or observed targeting of vulnerabilities, is used to update prior beliefs about the risk and adjust EPSS scores accordingly.
The EPSS model is fairly large, accounting for over 1,100 variables, each containing distinct attributes of vulnerability risk. The Exploit Prediction Scoring System then categorizes vulnerabilities as:
From a macro perspective, EPSS also aims to measure:
The idea behind using an EPSS model is to use all available knowledge of vulnerabilities in the cybersecurity community, and then devise your risk tolerance levels and vulnerability management activities based on scores that deliver the best efficiency and highest coverage.
EPSS attaches measurable metrics to vulnerability profiles, allowing teams to better address system issues. When analyzing a system, there are plenty of circumstances we may not be readily aware of, which can ultimately sway our response approach. Two major factors drive this uncertainty:
The user base and requirements to interact and access your technology systems are ever-evolving.
You cannot know with certainty – or specify exactly – how these interactions will evolve exactly 100 percent of the time.
For example, the unexpected and sudden lockdown decisions by the government during the Covid-19 pandemic led customers to shop frantically online for essential items in e-commerce stores. This led to a sudden rise in online traffic, which could look like a DoS attack. At the very least, this traffic overwhelmed the network of small e-commerce stores in some parts of the world.
Prior to the global pandemic, small e-commerce stores had rarely observed a surge in demand for online shopping or panic buying of essential items, outside of the holiday season.
The second problem is more open-ended: if an access request is incorrectly authorized by the network as a legitimate request, your data assets are only secure as long as they are encrypted.
In many cases, a vulnerability in the software, inadequate identity and access management and zero-day exploits will allow cybercriminals to bypass your network security defense. And since you do not know about the vulnerability existing within your system, you can only infer the behavior based on prior beliefs about traffic patterns, API requests, user activities and interactions.
In essence, to solve the problem of cybersecurity risk management, you need to accurately model the likelihood or probability of a vulnerability or an anomaly, based on prior knowledge of threats facing your organization.
This is exactly what any machine learning-based risk management tool would do. The problem still, and perhaps even beyond the capacity of a machine learning based tool, is to find an accurate prior knowledge of risk and vulnerabilities — prior knowledge which then guides the utilization of advanced ML tools to focus on the most prevalent security risks instead of simply attempting to fix them all right away.
EPSS’s community-driven approach attempts to do just that: provide a usable repository of historical knowledge in order to defend against future threats.
If you’re a cybersecurity professional, you’re likely more familiar with the Common Vulnerability Scoring System (CVSS). As the name suggests, CVSS has held its spot as the industry standard and has done so for nearly two decades.
Where EPSS attempts to measure the probability of a vulnerability being used in an exploit, CVSS attempts to assess the severity of a given vulnerability. This means CVSS is concerned with three areas:
In short, EPSS allows us to prioritize the most pressing vulnerabilities by providing threat actor information and a probabilistic understanding of threats, while CVSS tells us how dangerous a particular vulnerability might be if exploited.
EPSS is the newer methodology and already seems to be outperforming old CVSS models in its emergent state — a product of its focus on vulnerability prioritization extending beyond just incident severity prediction.
Though for that same reason, EPSS being so new, it’s likely that a hybrid approach of CVSS and EPSS is the most appropriate methodology. As technology evolves and these methodologies evolve alongside them, organizations will need to continuously measure their efficacy in stamping out cyberthreats — thankfully, this isn’t a challenge they have to face alone.
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.