Manage Vulnerable Items with no Assignment Group <!-- .SOKMKBArticle div.margin { padding: 10px 40px 40px 30px; color: #283d40; font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; font-size: 10pt; } .SOKMKBArticle div.fed{ background-color: #f5f8fa; border: 1px solid; border-color: #bfbfbf; padding: 10px; } .SOKMKBArticle .FedRestricted{ background-color: #c00000; color: #ffffff; padding: 10px; margin-top: 10px; text-align: center; font-size: 14pt; font-weight: bold; } .SOKMKBArticle .CustRestricted{ background-color: #ff0000; color: #ffffff; padding: 10px; margin-top: 10px; text-align: center; font-size: 14pt; font-weight: bold; } .SOKMKBArticle .SNRestricted{ background-color: #ea700d; color: #ffffff; padding: 10px; margin-top: 10px; text-align: center; font-size: 14pt; font-weight: bold; } .SOKMKBArticle .SNConfidential{ background-color: #ffc000; color: #ffffff; padding: 10px; margin-top: 10px; text-align: center; font-size: 14pt; font-weight: bold; } .SOKMKBArticle .Public{ background-color: #00b050; color: #ffffff; padding: 10px; margin-top: 10px; text-align: center; font-size: 14pt; font-weight: bold; } .SOKMKBArticle table.tocTable { border: 1px solid; border-color: #f2f2f2; background-color: #f2f2f2; padding-top: .6em; padding-bottom: .6em; padding-left: .9em; padding-right: .6em; } .SOKMKBArticle table.noteTable { align: left; border: none; border-color: #81b5a1; background-color: #f2f2f2; width: 100%; border-spacing: 2; font-size: 11px; } .SOKMKBArticle table.internalTable { border-top: 1px solid; border-left: 1px solid; border-color: #81b5a1; width: 100%; border-spacing: 1px; } .SOKMKBArticle .sp td { border-bottom: 1px solid; border-right: 1px solid; border-color: #81b5a1; background-color: #ffffff; height: 20px; padding-top: .5em; padding-bottom: .5em; padding-left: .5em; padding-right: .5em; } .SOKMKBArticle .sphr td { border-right: 1px solid; border-bottom: 1px solid; border-color: #81b5a1; background-color: rgb(245, 245, 245); padding-top: .5em; padding-bottom: .5em; padding-left: .5em; padding-right: .5em; height: 20px; } .SOKMKBArticle .sh td { border-bottom: 1px solid; border-right: 1px solid; border-color: #81b5a1; background-color: #81b5a1; color: #ffffff; height: 20px; padding-top: .5em; padding-bottom: .5em; padding-left: .5em; padding-right: .5em; } .SOKMKBArticle th { padding-top: .5em; padding-bottom: .5em; padding-left: .5em; padding-right: .5em; border-bottom: 1px solid; border-right: 1px solid; border-color: #646464; background: #646464; font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; font-size: 10pt; color: white !important; height: 20px; } .SOKMKBArticle td { border-color: #646464; margin: 5px 5px 5px 5px; padding: 5px 5px 5px 5px; font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; font-size: 10pt; color: #283d40; } .SOKMKBArticle p { color: #283d40; font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; } .SOKMKBArticle li { color: #283d40; font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; font-size: 10pt; line-height: 1.5; } .SOKMKBArticle pre { font-family: Courier New; } .SOKMKBArticle div { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; } .SOKMKBArticle hr { border-top-width: 1px; border-top-style: solid; border-top-color: #81b5a1; } .SOKMKBArticle a { color: #81b5a1; } .SOKMKBArticle a.two:link { padding: 15px 45px 15px 45px; margin-top: 20px; color: #ffffff; text-align: center; background-color: #1F8476; border: 1px solid; border-color: #1F8476; } .SOKMKBArticle a.two:visited { padding: 15px 45px 15px 45px; margin-top: 20px; color: #ffffff; text-align: center; background-color: #1F8476; border: 1px solid; border-color: #1F8476; } .SOKMKBArticle a.two:hover { color: #ffffff; background-color: #259b8a; } .SOKMKBArticle .button { padding: 15px 45px 15px 45px; margin-top: 20px; color: #ffffff; text-align: center; background-color: #1F8476; border: 1px solid; border-color: #1F8476; } .SOKMKBArticle .title { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #81b5a1; font-size: 30pt; } .SOKMKBArticle .hd1 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-size: 20pt; border-bottom: 1px solid; border-bottom-color: #81b5a1; text-decoration: none; } .SOKMKBArticle h1 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-size: 20pt; font-weight: normal; border-bottom: 1px solid; border-bottom-color: #81b5a1; text-decoration: none; } .SOKMKBArticle .hd2 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #68a1af; font-weight: bold; font-size: 16pt; text-decoration: none; } .SOKMKBArticle h2 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #68a1af; font-weight: bold; font-size: 16pt; font-weight: normal; text-decoration: none; } .SOKMKBArticle .hd3 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-weight: normal; font-size: 14pt; text-decoration: none; } .SOKMKBArticle h3 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-weight: normal; font-size: 14pt; text-decoration: none; } .SOKMKBArticle .hd4 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-weight: normal; font-size: 12pt; text-decoration: none; } .SOKMKBArticle h4 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-weight: normal; font-size: 12pt; text-decoration: none; } .SOKMKBArticle .hd5 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-weight: bold; font-size: 10pt; text-decoration: bold; } .SOKMKBArticle h5 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-weight: bold; font-size: 10pt; text-decoration: bold; } .SOKMKBArticle .hd6 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-weight: normal; font-size: 10pt; text-decoration: underline; } .SOKMKBArticle h6 { font-family: Century Gothic, Verdana, Helvetica, Arial, sans-serif; color: #283d40; font-weight: normal; font-size: 10pt; text-decoration: underline; } .SOKMKBArticle details { font-size: 10pt; } .SOKMKBArticle details[open] summary ~ * { animation: sweep .5s; margin-top: 0; padding-top: 10px; } @keyframes sweep { 0% {opacity: 0; margin-top: -10px} 100% {opacity: 1; margin-top: 0px} } .SOKMKBArticle summary { cursor: pointer; outline: none; margin-bottom: 3px; } .SOKMKBArticle .summary { background-color: #81b5a1; font-size: 10px; color: white; cursor: pointer; padding: 5px; width: 100%; border: none; text-align: left; outline: none; vertical-align: top; } --> Product Success Playbook Manage Vulnerability Items with no Assignment Group A step-by-step guide to analyze and remediate Vulnerability Response data issues Table of Contents Summary Goal of this Playbook Audience Problem Overview Executive Summary How this playbook can help you achieve business goals How this playbook is structured Problem Analysis Upstream Causes Downstream Consequences Impact on Your Business Engagement Questions Remediation Plays Summary Play 1: Review your data Play 2: Analyze your CI records Play 3: Fix Play Data Governance Summary Goal of this Playbook Understand and remedy the issue of Vulnerable Items (VIs) with missing Assignment Group (AG), that causes vulnerabilities to remain unaddressed and impacts the effectiveness of vulnerability remediation. Details about this playbook Author Eric FéronDate 12/16/2021Addresses HSD # HSD00010226Applicable ServiceNow Releases All releasesTime Required Approximately 1 to 2 hours (contingent to environment) Audience Vulnerability Administrator, Vulnerability Analysts, Remediation teams.ServiceNow Admin, CMDB team. Problem Overview As organizations continue to be exposed to fast growing volumes of vulnerabilities, it is critical for their risk profile that Vulnerable Items be assigned to Remediation teams so they can be addressed.Vulnerable Items (VIs) with no Assignment Group remain untreated, leaving the organization exposed. Executive Summary How this playbook can help you achieve business goals This playbook recognizes the need to rectify VIs records that are not qualified with an AG. It will help you fix these incomplete records and find a long-term solution to avoid the issue.It will ensure that Vulnerabilities are forwarded to remediation teams for action; this is turn will contribute to improving the vulnerability profile of you organization. How this playbook is structured This playbook contains four plays to help you rectify VIs with no AG.The 1st play is to show you how to locate the VIs table and visualize those not qualified with an AG.The 2nd and 3rd plays provides guidance to remedy the issue depending on its upstream cause.Lastly, a governance play offers peace of mind with an automatically scheduled replay. Problem Analysis Upstream Causes There are three reasons why a VI could be unmatched to an AG Assignment Rules were configured with no default rule: if the VI is not matched with any rule, it remains unmatched.A Scripted Assignment Rule does not have a default value: VIs are associated to a rule, but one (or more) scripted rule(s) is missing the default value.Assignment was successful, but AG was deleted afterwards: VIs are associated to rules but one (or more) Remediation Team field has become empty. Note: Two or more of these causes can coexist. It is recommended to investigate and fix them in the order they are displayed here. Downstream Consequences Data Consequence Missing relationships,Presence of non actionable VIs. Operation Consequence Remediation teams are unaware of actions to be taken to deal with vulnerabilities.Lack of remediation: deterioration of the vulnerability profile of the organization.Remediation teams will be assigned large volumes of work when the problem is fixed. App Consequence Dashboards & reports using the assignment group information for vulnerability response analysis will be of limited use Impact on Your Business VIs with no AG will leave your organization exposed and will negatively impact the effectiveness and efficiency of your Vulnerability Remediation teams, Vulnerability teams and audits. Security MTTR Slower response to vulnerability remediation. Audit/Compliance Incomplete VI data. Engagement Questions: Consider the answers to these questions: Is there a process in place to review and reconcile VIs with no AG?Is there an established relationship between the VR team and the CMDB team?Is the CI lifecycle management KB article widely used?Are there automated or manual processes that could delete or modify AG records?When the CMDB is updated, is the VR team informed? Remediation Plays SummaryThe table below lists and summarizes each of the remediation plays in the playbook. Details are included later. Play Name Analyze Play 1 What this play is about Finding the VIs with no Assignment Group Required tasks Obtain the table showing the VIs with no assignments Analyze Play 2 What this play is about Narrow the root cause Required tasks Filter list Fix Play 1 What this play is about Remedy the lack of a default assignment rule Required tasks Create a default rule and rerun the system Fix Play 2 What this play is about Diagnose and remedy a scripted assignment rule missing a default value Required tasks Filter VIs and add default value to script where needed Fix Play 3 What this play is about Remedy the deletion of a remediation team Required tasks Engage with the Platform team, create a new rule, rerun the system. Data Governance What this play is about Finding a long term solution to prevent the issue from reoccurring Required tasks Engage with the Platform team to establish a process Play 1 - Analyze your records - Show the VIs with no assignment group What this Play is about Shows you how to view your Vulnerability Items with no assignments. Required tasks Display the list of VIs Option1: In the navigator, search for "Vulnerable Items",Navigate to Vulnerability Response > Vulnerable Items > All , Option 2 (workaround recommended for organization with large volumes of VIs): In the navigator, search for "Vulnerable Items",Navigate to Vulnerability Response > Vulnerable Items > Critical and High Risk , Option 3 (workaround when navigation menu items are not available, ): Navigate to 'sn_vul_vulnerable_item.list' Fill in the Condition Builder as shown below:Run the filterThe list of VIs with no assignment group will then show. Play 2 - Analyze your records - Find the cause for the missing assignment group What this Play is about To help you find the reason why assignment groups are missing. Note: More than one reason can exist at any time. Required tasks With the filter conditions configured as described in Play 1 Ensure the "Assignment Groups" and "Assignment Rules" are displayed,If the field "Assignment Rules" is empty, the default assignment rule is missing (cause 1),If the field "Assignment Rules" is not empty, the case of the problem is either an incomplete scripted rule (cause 2)or a deleted remediation group (cause 3).The difference between the 2 can only be done after fixing for cause 2 (see Fix plays below). Play 3 - Fix Play - When the default Assignment Rule is absent What this Play is about To assign groups to past and future VIs with no assignment group, when the cause is the lack of a default assignment rule.There are two separate and complementary actions to be taken: One to fix future VIsOne to fix existing VIs It is recommended to execute both actions, starting with the fix for future VIs. Required tasks Create a new Assignment Rule, the "default" rule, to catch all VIs that do not get assigned by other rules . It can be called for example "Fallback",For "Assign using" select "User Group" (CANNOT be "User Group field" or "Script"),Select the "User Group" you need as per your VR strategy,Enter an order number for this rule that ensures it will be the last rule to run.Click "Apply changes" Note: For more information on how to create an assignment rule, see "Create or edit Vulnerability Response assignment rules".The system will then:- Ensure that all future VIs get assigned to an Assignment Group,- Assign all existing VIs with "State" is "Open" as per the default rule you just created (unless other rules changes have been made at the same time; It is recommended to not do other rules changes at the same time).- Note : If the existing VIs that just got newly assigned as per the default rule you just created were already part of a Vulnerability Group, they need to be reprocessed through the Vulnerability Groups. This is an advanced action that requires specialist action. Please contact Support or your Partner. Play 4 - Fix Play - When scripted rules are missing a default value What this Play is about This will help you select and fix only the VIs with no assignment group associated to a scripted rule Required tasks With the filter conditions configured as described in Play 2 Complete the conditions as shown below: Run the filterOpen the scripted assignment ruleComplete the scripted rule with the default valueNote: For more information on how to create an assignment rule, see "Create or edit Vulnerability Response assignment rules". Play 5 - Fix Play - When a remediation team (a.k.a. assignment group) has been deleted What this Play is about To assign groups to past and future VIs with no assignment group, when the cause is the deletion of a Remediation team. Required tasks Apply fix plays 4 and 5 to clear all VIs without assignment group as a result of missing default rule or incomplete scripted rule.For the VIs still missing an assignment group: Engage with the Platform team to obtain the name of a new group(s),Update the appropriate assignment rules with the names of the new group(s) where needed, or create a new rule to assign the VIs no assignment group to a new assignment groupRun the system again. All VIs will now have an assignment group.Establish a process Note: For more information on how to create an assignment rule, see "Create or edit Vulnerability Response assignment rules". Data Governance What this Play is about To help you ensure that assignment team changes in the CMDB no longer impact the assignment of VIs. Required tasks Engage with the Platform team.Explain the issue created by the deletion of an assignment group and its impact.Establish a process in collaboration with the Platform and CMDB teams to avoid future issues. Congratulations You have completed this Product Success Playbook.