Do you have a list of all of your vulnerabilities? Of course not! Not ALL at least.
Hopefully you have a software or scanner that gives you a sense of what vulnerabilities are present in your environment. In this case, I entered an environment that had purchased a vulnerability management scanner and stood it up with some default scans and data from the vendor but hadn't touched it sense. For over a year, it mostly had set there untouched with the exception of a quick glance when Log4Shell hit the news.
Looking at the software, we had an extremely high risk score that needed to be reduced by simply patching some bugs. Starting with some of the basics, I used the built sites and subnets for our office, paired with a network-based scanning and agent-based scanning to gather vulnerabilities on endpoints. I quickly realized that our discovered asset count was wildly skewed by "Dead IP addresses" (duplicative .0 and .255's with 0 risk, for instance).
After throwing some regex into the scan engine to ignore those dead IPs, I grouped the assets in various asset groups such as Operating System, OS type, risk severity, location, DC, etc. amongst a few other dynamic optimizations. This allowed me to create dynamic queries based on the assets and the vulnerabilities per asset which was crucial for my next project.
Knowing that I needed to reduce this risk, but couldn't do so without proper initiatives, I took the dynamic queries and created "Remediation Projects". These remediation projects were grouped by query. This could be type of vulnerability, or asset, or OS type, or severity. It depended on the query and my needs. Below are a couple of the hugely impactful projects I built queries for:
Highest severity vulnerabilities
Highest severity vulnerabilities for public facing apps/webapps/DMZ
Windows 10 EOS/EOL versions
Windows server EOS/EOL versions
Patches with the largest risk reduction company wide
Assets missing browser updates
Assets missing Windows updates
Assets missing Security updates
Assets with vulnerable Adobe/iTunes/etc. software versions
These few examples were the stage of my remediation projects, all with their own goals and needs. These remediation projects could have many outcomes or mitigations, ranging from editing the WAF, updating applications, updating OS, decommissioning a device, removing an application, removing a browser, enabling a security feature such as BitLocker, etc.
After gathering these remediation projects and initial data, I met with the IT stakeholders involved with patch and asset management. This led to the successful implementation of auto-updates for Windows Operating Systems and browsers, third party apps to come eventually. In the meantime, I reached out to individuals and department heads to coordinate updates and patches where appropriate for high risk scenarios. Overall, this led to a reduction in the calculated risk score by over 70% in my first year.