Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

  • Twitter
  • Facebook
  • LinkedIn

New Approaches for the “New Normal” in State and Local Government Cyber Defense

New Approaches for the “New Normal” in State and Local Government Cyber Defense

Adjusting to the new normal, state and local governments need to be more vigilant and streamlined in protecting their environments against cyber predators. What tactics can help provide high levels of security while also meeting restrictive budget and resource requirements?

Even before the COVID-19 pandemic struck, state and local governments were struggling to secure a quickly expanding cyberattack surface with available resources. Now, ransomware purveyors and other cyber hackers are licking their chops to take advantage of any signs of weakness as governments react to this worldwide crisis. They will not let up once the storm has passed. In such a dangerous environment, business as usual is not an option. Implementing a new approach that enables governments to “do more with less” is imperative. 

We examine two approaches that have the potential – whether implemented together or separately – to deliver greater security across all levels of government while decreasing the cost and workload required to achieve that goal. 

Approach #1: A new focus on teamwork – taking a “whole of state” approach 

Every government organization has unique characteristics and requirements, but if they can come together on a common security approach to achieve a common objective, with the flexibility to tailor that approach to meet unique needs, they can all reap benefits in lower costs and improved cybersecurity posture.

Over the past seven years, the U.S. federal government has been moving in that direction through its Continuous Diagnostics and Mitigation (CDM) program, which brings the entire federal .gov domain together. There have been lessons learned along the way that have driven program improvements. As a result, significant benefits are starting to emerge. For example:

  • Economies of scale have enabled enterprise licensing and other creative purchasing options to lower software and hardware costs to participating agencies.
  • An “Approved Product List” process and standards have simplified the process of selecting cybersecurity tools, enabled new technology options to be added efficiently and provided assurance that tools selected will meet requirements.
  • A flexible services contracting approach has allowed government agencies to select the tools, and design the cybersecurity solution, that best meet their unique needs – and implement those solutions expeditiously. 

CDM aside, the more a state can take a team approach, get buy-in at all levels to the concept of collective defense, and even go a step further to include academia and the private sector, the better all organizations within that state can defend against cyberattacks to any one of them. As ransomware and other cyber threats continue to attack state and local governments, a “circling the wagons” approach that brings state, local and private sector partners together to fight common enemies will become increasingly essential.

States that look to approach cyber defense from a team perspective will also find an increasing amount of federal resources and support dedicated to helping them on their cyber journey as part of a collective defense approach.

Approach #2: A new risk-based approach to vulnerability management 

Moving to a “whole of state” approach is a long-term undertaking. The benefits, though potentially significant, will not be fully realized for some years in the future. Taking a risk-based approach to vulnerability management, however, can deliver immediate and significant benefits in security, efficiency and communication of cyber risk to non-cyber leaders.

Focus first on what matters most

One of the key elements in basic cyber hygiene is doing timely updates – patching software vulnerabilities. The problem is that more connections – and connections are exploding since COVID-19 created an entirely new remote workforce, teleworking and remotely accessing sensitive systems – mean more vulnerabilities to patch.

Even in the best of times, patching every vulnerability in every network device is an impossible dream. In the current environment, with networks expanding and resources being strained to the breaking point, many vulnerabilities are likely to remain unpatched for prolonged periods of time. But, here’s the good news: You don’t have to patch every vulnerability to secure your network. You just need to patch the vulnerabilities that matter.

Predictive Prioritization can help you become more secure by guiding you to the small percentage of vulnerabilities that matter most. Predictive Prioritization is a data science–based process that goes beyond CVSS and reprioritizes each vulnerability based on the likelihood it will be leveraged in a cyberattack. Predictive Prioritization assigns a vulnerability priority rating (VPR) to every vulnerability, including vulnerabilities that have yet to be published in the U.S. National Vulnerability Database (NVD), and updates the ratings daily based on threat intelligence and other data inputs.

The Tenable data science team estimates that, on average, only 3% of vulnerabilities are actually exploited. Putting this into perspective, the NVD reported approximately 17,300 new vulnerabilities in 2019, of which 56%, or about 9,700 were rated “critical” or “high.” If you based your patching on CVSS scoring, you would have a major patching requirement with no assurance that you were actually lowering the risk of an exploit. If, however, you were guided by VPR to the 3% that truly posed a risk, you would only need to patch about 500 of those 17,300 to eliminate all vulnerabilities that posed a risk of exploit. 

Deliver actionable cyber risk data to enable informed decision-making

Through the CDM dashboard ecosystem, the federal government is seeking to deliver its version of what Tenable provides through Predictive Prioritization. The CDM program is also building on that capability to deliver actionable risk-scoring information through the dashboard’s AWARE (Agency-Wide Adaptive Risk Enumeration) algorithm. AWARE scores agencies’ risk postures numerically and provides guidance to agencies on steps to improve AWARE scores. Each federal agency sees its own AWARE score and a federal average score, providing a benchmark for measuring effectiveness. 

While something on the scale of a CDM dashboard ecosystem might seem out of reach for most state or local governments, implementing a solution that delivers actionable risk-scoring data does not require such a massive undertaking. Any government agency can do it today with the Tenable Risk-Based Vulnerability Management Solution, which builds on Predictive Prioritization to deliver measurable data to support effective risk-based decisions. 

In addition to VPR, which prioritizes vulnerabilities based on external criteria, the Tenable Risk-Based Vulnerability Management Solution adds an asset criticality rating (ACR), which provides organizational context by taking more of an internal look to derive the criticality of an asset. ACR is based on several factors/rules derived from scan output. The ACR is derived by an algorithm that pulls from scan data, but the result can also be customized based on particular organizational priorities. The ACR algorithm scores each asset based on:

  • Where the asset is located and its exposure to the internet
  • The type of device for a given asset
  • Device functionality

Tenable’s Risk-Based Vulnerability Management Solution combines VPR and ACR scoring to calculate a Cyber Exposure Score, which provides an objective measure of an asset, business unit or whole organization’s cyber risk, depending on the desired view. This measure enables organizational decision-makers to make informed decisions on risk acceptance and reduction. Vulnerabilities are a part of the equation, to be sure, but the scoring the Tenable solution presents is a comprehensive picture of cyber risk that informs decisions about how to reduce risk and measures progress in reducing risk against meaningful internal and external benchmarks.

Get more info

Related Articles

Are You Vulnerable to the Latest Exploits?

Enter your email to receive the latest cyber exposure alerts in your inbox.

Try for Free Buy Now
Tenable.io FREE FOR 30 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Tenable.io BUY

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Choose Your Subscription Option:

Buy Now
Try for Free Buy Now

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning


Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.



Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security


Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Get a Demo

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.

Try for Free Contact Sales

Try Tenable Lumin


Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Buy Tenable Lumin

Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.

Request a Demo

Request a demo of Tenable.ot

Get the Operational Technology Security You Need.
Reduce the Risk You Don’t.

Request a Demo


Continuously detect and respond to Active Directory attacks. No agents. No privileges. On-prem and in the cloud.