DEV Community

Cover image for DevSecOps : How to configure CIS benchmarks on Ubuntu Linux Server | Cloud | On-premises | Nessus Vulnerability
SyedAsadRazaDevops
SyedAsadRazaDevops

Posted on • Edited on

DevSecOps : How to configure CIS benchmarks on Ubuntu Linux Server | Cloud | On-premises | Nessus Vulnerability

what are the benchmark?
Benchmarking is a process of measuring the performance of a company's products, services, or processes against those of another business considered to be the best in the industry, aka “best in class.” The point of benchmarking is to identify internal opportunities for improvement.

Nessus : A security vulnerability scanning tool

1 most useful security tool ! ( www.insecure.org survey )

What is Nessus ?

Nessus is a remote security scanning tool, which scans a computer and raises an alert if it discovers any vulnerabilities that malicious hackers could use to gain access to any computer you have connected to a network. It does this by running over 1200 checks on a given computer, testing to see if any of these attacks could be used to break into the computer or otherwise harm it.

Who would use a tool like this ?

If you are an administrator in charge of any computer (or group of computers) connected to the internet, Nessus is a great tool help keep their domains free of the easy vulnerabilities that hackers and viruses commonly look to exploit.

What Nessus is NOT ?

Nessus is not a complete security solution, rather it is one small part of a good security strategy. Nessus does not actively prevent attacks, it is only a tool that checks your computers to find vulnerabilities that hackers COULD exploit. IT IS UP TO THE SYSTEM ADMINISTRATOR TO PATCH THESE VULNERABILITIES IN ORDER TO CREATE A SECURITY SOLUTION.

How To: Run Your First Vulnerability Scan with Nessus

Step 1: Creating a Scan

Once you have installed and launched Nessus, you’re ready to start scanning. First, you have to create a scan. To create your scan:

  1. In the top navigation bar, click Scans.
  2. In the upper-right corner of the My Scans page, click the New Scan button.

Step 2: Choose a Scan Template

Next, click the scan template you want to use. Scan templates simplify the process by determining which settings are configurable and how they can be set.

To see a full list of the types of templates available in Nessus, see Scan and Policy Templates. To quickly get started with Nessus, use the Basic Network Scan template.

Step 3: Configure Scan Settings

Prepare your scan by configuring the settings available for your chosen template. The Basic Network Scan template has several default settings preconfigured, which allows you to quickly perform your first scan and view results without a lot of effort.

Follow these steps to run a basic scan:

1. Configure the settings in the Basic Settings section.
Image description

2. Configure remaining settings
Although you can leave the remaining settings at their pre-configured default, Tenable recommends reviewing the Discovery, Assessment, Report and Advanced settings to ensure they are appropriate for your environment.

3. Configure Credentials
Optionally, you can configure Credentials for a scan. This allows credentialed scans to run, which can provide much more complete results and a more thorough evaluation of the vulnerabilities in your environment.

4. Launch Scan
After you have configured all your settings, you can either click the Save button to launch the scan later, or launch the scan immediately.

If you want to launch the scan immediately, click the down button, and then click Launch. Launching the scan will also save it.

Step 4: Viewing Your Results
Viewing scan results can help you understand your organization’s security posture and vulnerabilities. Color-coded indicators and customizable viewing options allow you to tailor how you view your scan’s data.
You can view scan results in one of several views:
Viewing scan results by vulnerabilities gives you a view into potential risks on your assets.

Image description

To view vulnerabilities:

In the top navigation bar, click Scans.
Click the scan for which you want to view results.
Do one of the following:

Click a specific host to view vulnerabilities found on that host.
Click the Vulnerabilities tab to view all vulnerabilities.
(Optional) To sort the vulnerabilities, click an attribute in the table header row to sort by that attribute.
Clicking on the vulnerability row will open the vulnerability details page, displaying plugin information and output for each instance on a host.

Step 5: Reporting Your Results
Chances are your job isn’t done yet. You need to report your findings to your team.

Scan results can be exported in several file formats. Some of these report formats are customizable, while others are designed to be imported into another application or product, such as Microsoft Excel or Tenable.sc. For an explanation of the various report formats and the purpose of each, see the Nessus User Guide.

Conclusion
The Nessus Vulnerability Scanner is one of the most common vulnerability scanners in the cybersecurity industry today. The functionality that you get, especially with the commercial version, is total guarantee of value for your money. While it is also important to confirm your vulnerability hits by running other vulnerability scanners against your targets to eliminate the possibility of any false positives, Nessus’s functions justify its popularity.

THANKYOU! FOR READING

Top comments (0)