STATE REGULATION OF NAMING AND SOFTWARE IDENTIFICATION IN VULNERABILITY MANAGEMENT PROCESSES
Abstract
IT asset management is the foundation for building an effective vulnerability management process.
Without an understanding of the IT assets under control, it is technically impossible to start building a
vulnerability management process. With an existing IT asset management process in place, one of the
tasks that is essential to vulnerability management is to uniquely name software as an asset. This unambiguous
naming allows the software and its vulnerabilities to be identified without actively scanning IT
infrastructure nodes, but only by interacting with the IT asset management system. Technically, this approach
can be called “passive vulnerability detection,” but it is extremely labor-intensive to implement
using existing naming systems. In order to make the possibility of passive detection more realistic, the
authors propose to create a common foundation by forming a conceptual scheme and then creating a system
of standardized naming and identification of software, the regulation of which will be centralized at
the state level. As part of the review of existing software naming systems, attention is paid to CPE problems
both on the part of on-site specialists, namely obtaining CPE identifiers and translating software
information into a CPE identifier, and on the part of a vulnerability data aggregator, namely obtaining
vulnerability information via a CPE identifier. The problems of CPE application, as well as the problems
of interaction with vulnerability data aggregators from unfriendly countries, discovered in the course of
the research form the prerequisites for the formation of a national system for state regulation of software
naming and identification, which will eliminate the problems of existing software naming systems. In conclusion,
advantages of the national system of software naming and identification are given in case of its
creation and use in real conditions by all participants of the vulnerability management process








