Three steps to calmly deal with Bash Vulnerabilities

Source: Internet
Author: User

Three steps to calmly deal with Bash Vulnerabilities

Although the bash vulnerability has caused an uproar in the industry, it has not collapsed. This is not the first and not the last one that has a huge destructive power. The problem is inevitable, but the key is what to do after the problem occurs.

Step 1: understand what happened.

Do not rush to take action first. Take some time to understand the severity, possible consequences and impacts of bash, and make up for the difficulties of the vulnerability. With the development of vulnerability analysis in the industry, the vulnerability details become clearer. Therefore, in the initial stage of a vulnerability, you must collect relevant information to learn more about the vulnerability. Note the following three aspects:

1. Obtain the actual information to confirm the understanding of the vulnerability. When a vulnerability outbreak occurs, various analysis reports are overwhelming. What is needed at this time is calm analysis and clear judgment.

2. Explain the vulnerability to others. Includes your team, colleagues, and management.

3. Consider how to take measures. What resources are required? What is the processing process? What is the scope of impact? How fast is the response speed?

Step 2: quickly evaluate the system environment.

Different vulnerabilities cause different risks. In addition to automatic scanning tools, you must perform manual checks. If necessary, you must also use the help of the vendor to determine the specific risks. Focus on potential risks, assess response capabilities, and mobilize all resources as much as possible. With the participation of personnel from other departments related to the system, these persons can assess the possible risks and impacts, including time, cost, and impact, based on their work experience, potential difficulties and complex factors lead to more accurate assessment conclusions.

Third, conduct detection at the same time when determining the emergency work sequence.

When a new vulnerability is exposed, it is very likely that the attacker has intruded into the system by exploiting the vulnerability. Therefore, it is necessary to detect and troubleshoot the system conditions, and discover and remedy the problem as quickly as possible. Emergency response includes systems with vulnerabilities, infected devices, security policies, system tests, and patch management. First, ensure the most important system, and then handle other problems in a tight and orderly manner.

Remember: "Slow is fast ". It may take several hours or even one or two days to form an action plan. Using this period of time to smoothly plan the links between various parts, reduce conflict and friction, and ultimately form faster remedial measures.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.