Hello r/NISTControls!
Our organization recently suffered a massive outage due to an IT vendor's operational bug. This was *not* a CVE. I'm fairly familiar with all of the cybersecurity controls surrounding CVEs or security vulnerabilities. Can someone point me to controls that would mitigate against a bug like this for example:
https://bst.cisco.com/quickview/bug/CSCwf08698
You'll see that this is not a CVE and none of the security vulnerability solutions would address it. Here are the controls I found, but my concerns that they won't address the risk:
- SI-2 has the word 'vulnerability' in it and that's usually associated with CVEs (same rationale for SI-2(2) and SI-2(3))
- SI-7 doesn't seem to fit because it wasn't an unauthorized change
- CM-2 doesn't apply because this bug was not announced from the vendor prior to when the asset was placed into service.
Traditionally patch management solutions address operating system bugs/flaws/patches so references to patch management doesn't seem right.
Follow up question - how are your organizations tracking bugs if your CVE solutions aren't addressing them? Ideally in an automated fashion. And I'm not talking about the operating system (server/desktop) level.
Thank you in advance!
[link] [comments]