{"id":13591,"date":"2025-07-31T18:32:51","date_gmt":"2025-07-31T15:32:51","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13591"},"modified":"2025-07-31T18:32:51","modified_gmt":"2025-07-31T15:32:51","slug":"cvss-rbvm-vulnerability-management","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/cvss-rbvm-vulnerability-management\/13591\/","title":{"rendered":"CVSS&#8217;den RBVM&#8217;ye: G\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00f6nceliklendirmesinin do\u011fru yap\u0131l\u0131\u015f\u0131"},"content":{"rendered":"<p><u>CVSS (Common Vulnerability Scoring System)<\/u> ile ilk kar\u015f\u0131la\u015ft\u0131\u011f\u0131n\u0131zda, bunun g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 \u00f6nceliklendirmek i\u00e7in m\u00fckemmel bir ara\u00e7 oldu\u011funu d\u00fc\u015f\u00fcnmek kolayd\u0131r. Daha y\u00fcksek bir puan daha kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 anlam\u0131na gelmeli, de\u011fil mi? Ger\u00e7ekte, bu yakla\u015f\u0131m pek i\u015fe yaramaz. Her y\u0131l, y\u00fcksek CVSS puanlar\u0131na sahip g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n say\u0131s\u0131n\u0131n artt\u0131\u011f\u0131n\u0131 g\u00f6r\u00fcyoruz. G\u00fcvenlik ekipleri bunlar\u0131n hepsini zaman\u0131nda yamalayamaz, ancak bu kusurlar\u0131n b\u00fcy\u00fck \u00e7o\u011funlu\u011fu ger\u00e7ek d\u00fcnyadaki sald\u0131r\u0131larda asla kullan\u0131lmaz. Bu arada, sald\u0131rganlar s\u00fcrekli olarak daha d\u00fc\u015f\u00fck puanlara sahip daha az g\u00f6steri\u015fli g\u00fcvenlik a\u00e7\u0131klar\u0131ndan yararlan\u0131yor. \u00c7ak\u0131\u015fan CVSS puanlar\u0131 gibi tamamen teknik sorunlardan i\u015f ba\u011flam\u0131 eksikli\u011fi gibi kavramsal sorunlara kadar uzanan ba\u015fka gizli tuzaklar da vard\u0131r.<\/p>\n<p>Bunlar CVSS\u2019nin kendi eksiklikleri de\u011fildir. Bunun yerine, bu arac\u0131n daha sofistike ve kapsaml\u0131 bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 y\u00f6netimi s\u00fcrecinin bir par\u00e7as\u0131 olarak, do\u011fru bir \u015fekilde kullan\u0131lmas\u0131 gerekti\u011finin alt\u0131n\u0131 \u00e7izmektedir.<\/p>\n<h2>CVSS tutars\u0131zl\u0131klar\u0131<\/h2>\n<p>Ayn\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n mevcut kayna\u011fa ba\u011fl\u0131 olarak nas\u0131l farkl\u0131 \u00f6nem derecelerine sahip olabilece\u011fini hi\u00e7 fark ettiniz mi? Bir puan bunu bulan siber g\u00fcvenlik ara\u015ft\u0131rmac\u0131s\u0131ndan, di\u011feri g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olan yaz\u0131l\u0131m\u0131n sat\u0131c\u0131s\u0131ndan ve bir di\u011feri de ulusal g\u00fcvenlik a\u00e7\u0131\u011f\u0131 veri taban\u0131ndan m\u0131? Bu her zaman basit bir hata de\u011fildir. Bazen farkl\u0131 uzmanlar a\u00e7\u0131\u011f\u0131n ba\u011flam\u0131 konusunda ayn\u0131 fikirde olmayabilirler. G\u00fcvenlik a\u00e7\u0131\u011f\u0131 bulunan bir uygulaman\u0131n hangi ayr\u0131cal\u0131klarla \u00e7al\u0131\u015ft\u0131\u011f\u0131 veya internete a\u00e7\u0131k olup olmad\u0131\u011f\u0131 konusunda farkl\u0131 fikirlere sahip olabilirler. \u00d6rne\u011fin bir sat\u0131c\u0131, de\u011ferlendirmesini \u00f6nerilen en iyi uygulamalara dayand\u0131rabilirken, bir g\u00fcvenlik ara\u015ft\u0131rmac\u0131s\u0131 uygulamalar\u0131n ger\u00e7ek d\u00fcnya kurulu\u015flar\u0131nda tipik olarak nas\u0131l yap\u0131land\u0131r\u0131ld\u0131\u011f\u0131n\u0131 dikkate alabilir. Bir ara\u015ft\u0131rmac\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 karma\u015f\u0131kl\u0131\u011f\u0131n\u0131 y\u00fcksek olarak de\u011ferlendirirken, bir di\u011feri d\u00fc\u015f\u00fck olarak de\u011ferlendirebilir. Bu nadir g\u00f6r\u00fclen bir durum de\u011fildir. Vulncheck taraf\u0131ndan 2023 y\u0131l\u0131nda yap\u0131lan bir <a href=\"https:\/\/vulncheck.com\/blog\/cvss-accuracy-issues\" target=\"_blank\" rel=\"nofollow noopener\">ara\u015ft\u0131rma<\/a>, Ulusal G\u00fcvenlik A\u00e7\u0131\u011f\u0131 Veri Taban\u0131ndaki (NVD) g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n %20\u2019sinin farkl\u0131 kaynaklardan al\u0131nan iki CVSS3 puan\u0131na sahip oldu\u011funu ve bu e\u015fle\u015ftirilmi\u015f puanlar\u0131n %56\u2019s\u0131n\u0131n birbiriyle \u00e7eli\u015fti\u011fini ortaya koymu\u015ftur.<\/p>\n<h2>CVSS kullan\u0131rken s\u0131k yap\u0131lan hatalar<\/h2>\n<p><a href=\"https:\/\/www.first.org\/about\/mission\" target=\"_blank\" rel=\"nofollow noopener\">FIRST<\/a>, on y\u0131l\u0131 a\u015fk\u0131n bir s\u00fcredir CVSS\u2019nin metodolojik olarak do\u011fru uygulanmas\u0131n\u0131 savunmaktad\u0131r. Yine de g\u00fcvenlik a\u00e7\u0131\u011f\u0131 y\u00f6netim s\u00fcre\u00e7lerinde CVSS derecelendirmelerini kullanan kurulu\u015flar tipik hatalar yapmaya devam eder:<\/p>\n<ol>\n<li>CVSS taban puan\u0131n\u0131 birincil risk g\u00f6stergesi olarak kullanmak: CVSS, bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n ciddiyetini \u00f6l\u00e7er; ne zaman k\u00f6t\u00fcye kullan\u0131laca\u011f\u0131n\u0131 veya bu k\u00f6t\u00fcye kullanman\u0131n sald\u0131r\u0131 d\u00fczenlenen kurulu\u015f \u00fczerindeki potansiyel etkisini \u00f6l\u00e7mez. Bazen kritik bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131, \u00f6nemsiz ve kapal\u0131 sistemlerde bulundu\u011fu i\u00e7in spesifik bir \u015firket ortam\u0131nda zarars\u0131zd\u0131r. Tersine, b\u00fcy\u00fck \u00f6l\u00e7ekli bir fidye yaz\u0131l\u0131m\u0131 sald\u0131r\u0131s\u0131, CVSS puan\u0131 6 olan g\u00f6r\u00fcn\u00fc\u015fte zarars\u0131z bir bilgi s\u0131z\u0131nt\u0131s\u0131 a\u00e7\u0131\u011f\u0131 ile ba\u015flayabilir.<\/li>\n<li>Tehdit\/Zamansal ve \u00c7evresel ayarlamalar olmadan CVSS Taban puan\u0131n\u0131 kullanmak: Yamalar\u0131n, halka a\u00e7\u0131k a\u00e7\u0131kl\u0131klar\u0131n ve telafi edici \u00f6nlemlerin mevcudiyeti, bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n nas\u0131l ve ne kadar acilen ele al\u0131nmas\u0131 gerekti\u011fini \u00f6nemli \u00f6l\u00e7\u00fcde etkiler.<\/li>\n<li>Yaln\u0131zca belirli bir puan\u0131n \u00fczerindeki g\u00fcvenlik a\u00e7\u0131klar\u0131na odaklanmak: Bu yakla\u015f\u0131m bazen devlet veya end\u00fcstri d\u00fczenleyicileri taraf\u0131ndan zorunlu k\u0131l\u0131nmaktad\u0131r (\u201cCVSS puan\u0131 8\u2019in \u00fczerinde olan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 bir ay i\u00e7inde giderin\u201d). Sonu\u00e7 olarak, siber g\u00fcvenlik ekipleri, ger\u00e7ekte altyap\u0131lar\u0131n\u0131 daha g\u00fcvenli hale getirmeyen, s\u00fcrekli artan bir i\u015f y\u00fck\u00fcyle kar\u015f\u0131 kar\u015f\u0131ya kalmaktad\u0131r. Her y\u0131l tespit edilen y\u00fcksek CVSS puan\u0131na sahip g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n say\u0131s\u0131 <a href=\"https:\/\/nvd.nist.gov\/general\/visualizations\/vulnerability-visualizations\/cvss-severity-distribution-over-time#CVSSSeverityOverTime\" target=\"_blank\" rel=\"nofollow noopener\">son 10 y\u0131lda h\u0131zla artmaktad\u0131r<\/a>.<\/li>\n<li>K\u00f6t\u00fcye kullanma olas\u0131l\u0131\u011f\u0131n\u0131 de\u011ferlendirmek i\u00e7in CVSS kullanmak: Bu \u00f6l\u00e7\u00fctler aras\u0131nda zay\u0131f bir korelasyon vard\u0131r; <a href=\"https:\/\/vulmon.com\/docs\/Vulnerability-Scoring\/KEV\" target=\"_blank\" rel=\"nofollow noopener\">kritik g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n yaln\u0131zca %17\u2019si<\/a> sald\u0131r\u0131larda kullan\u0131lmaktad\u0131r.<\/li>\n<li>Sadece CVSS derecelendirmesini kullanmak: CVSS\u2019de standartla\u015ft\u0131r\u0131lm\u0131\u015f vekt\u00f6r dizisi, savunucular\u0131n bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n ayr\u0131nt\u0131lar\u0131n\u0131 anlayabilmeleri ve kendi organizasyonlar\u0131 i\u00e7indeki \u00f6nemini ba\u011f\u0131ms\u0131z olarak hesaplayabilmeleri i\u00e7in tan\u0131t\u0131ld\u0131. CVSS 4.0, ek metrikler kullanarak i\u015f ba\u011flam\u0131n\u0131 hesaba katmay\u0131 kolayla\u015ft\u0131rmak i\u00e7in \u00f6zellikle revize edilmi\u015ftir. Yaln\u0131zca say\u0131sal bir derecelendirmeye dayanan herhangi bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 y\u00f6netimi \u00e7al\u0131\u015fmas\u0131 b\u00fcy\u00fck \u00f6l\u00e7\u00fcde etkisiz olacakt\u0131r.<\/li>\n<li>Ek bilgi kaynaklar\u0131n\u0131 g\u00f6z ard\u0131 etmek: Tek bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 veri taban\u0131na g\u00fcvenmek ve sadece CVSS analizi yapmak yetersizdir. Yamalar, \u00e7al\u0131\u015fan kavram kan\u0131tlar\u0131 ve ger\u00e7ek d\u00fcnyadaki k\u00f6t\u00fcye kullan\u0131m vakalar\u0131 hakk\u0131nda veri olmamas\u0131, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n nas\u0131l ele al\u0131naca\u011f\u0131na karar vermeyi zorla\u015ft\u0131rmaktad\u0131r.<\/li>\n<\/ol>\n<h2>CVSS bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 hakk\u0131nda size ne s\u00f6ylemez?<\/h2>\n<p>CVSS; bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n ciddiyetini, hangi ko\u015fullar alt\u0131nda k\u00f6t\u00fcye kullan\u0131labilece\u011fini ve savunmas\u0131z bir sistem \u00fczerindeki potansiyel etkisini tan\u0131mlamak i\u00e7in tasarlanm\u0131\u015f bir end\u00fcstri standard\u0131d\u0131r. Ancak, bu a\u00e7\u0131klaman\u0131n (ve CVSS Taban puan\u0131n\u0131n) \u00f6tesinde, kapsamad\u0131\u011f\u0131 \u00e7ok \u015fey vard\u0131r:<\/p>\n<ul>\n<li>G\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 kim buldu? Sat\u0131c\u0131 m\u0131, hatay\u0131 bildiren ve yama bekleyen etik bir ara\u015ft\u0131rmac\u0131 m\u0131, yoksa k\u00f6t\u00fc niyetli bir akt\u00f6r m\u00fc?<\/li>\n<li>Herkesin ula\u015fabilece\u011fi bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 var m\u0131? Ba\u015fka bir deyi\u015fle, g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan faydalanmak i\u00e7in kullan\u0131labilecek haz\u0131r kod var m\u0131?<\/li>\n<li>Ger\u00e7ek d\u00fcnya senaryolar\u0131nda kullan\u0131lmas\u0131 ne kadar pratik?<\/li>\n<li>Bir yama var m\u0131? T\u00fcm savunmas\u0131z yaz\u0131l\u0131m s\u00fcr\u00fcmlerini kaps\u0131yor mu ve uygulaman\u0131n potansiyel yan etkileri neler?<\/li>\n<li>Kurulu\u015f g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 ele almal\u0131 m\u0131? Yoksa sa\u011flay\u0131c\u0131n\u0131n kusurlar\u0131 otomatik olarak d\u00fczeltece\u011fi bir bulut hizmetini (SaaS) mi etkiliyor?<\/li>\n<li>Vah\u015fi do\u011fada s\u00f6m\u00fcr\u00fc belirtileri var m\u0131?<\/li>\n<li>Hi\u00e7biri yoksa, sald\u0131rganlar\u0131n gelecekte bu g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlanma olas\u0131l\u0131\u011f\u0131 ne?<\/li>\n<li>Kurulu\u015funuzdaki hangi belirli sistemler savunmas\u0131z?<\/li>\n<li>K\u00f6t\u00fcye kullan\u0131m bir sald\u0131rgan i\u00e7in pratik olarak eri\u015filebilir durumda m\u0131? \u00d6rne\u011fin, bir sistem \u00e7evrimi\u00e7i herkesin eri\u015febildi\u011fi kurumsal bir web sunucusu olabilir veya a\u011f eri\u015fimi olmayan tek bir bilgisayara fiziksel olarak ba\u011fl\u0131 savunmas\u0131z bir yaz\u0131c\u0131 olabilir. Daha karma\u015f\u0131k bir \u00f6rnek, bir yaz\u0131l\u0131m bile\u015feninin y\u00f6ntemindeki bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olabilir. Ancak bu bile\u015feni kullanan belirli bir i\u015f uygulamas\u0131, y\u00f6ntemi hi\u00e7bir zaman \u00e7a\u011f\u0131rmaz.<\/li>\n<li>Savunmas\u0131z sistemler tehlikeye girerse ne olur?<\/li>\n<li>B\u00f6yle bir olay\u0131n i\u015fletmeye finansal maliyeti nedir?<\/li>\n<\/ul>\n<p>T\u00fcm bu fakt\u00f6rler, bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n ne zaman ve nas\u0131l giderilece\u011fi, hatta giderilmesinin gerekli olup olmad\u0131\u011f\u0131 karar\u0131n\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde etkiler.<\/p>\n<h2>CVSS nas\u0131l iyile\u015ftirilir? Cevap RBVM\u2019de!<\/h2>\n<p>CVSS s\u0131n\u0131rlar\u0131 i\u00e7inde hesaba kat\u0131lmas\u0131 genellikle zor olan bir\u00e7ok fakt\u00f6r, risk tabanl\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 y\u00f6netimi (RBVM) olarak bilinen pop\u00fcler bir yakla\u015f\u0131m\u0131n merkezinde yer al\u0131r.<\/p>\n<p>RBVM, d\u00fczenli olarak tekrarlanan birka\u00e7 temel a\u015famas\u0131 olan, b\u00fct\u00fcnsel ve d\u00f6ng\u00fcsel bir s\u00fcre\u00e7tir:<\/p>\n<ul>\n<li>\u0130\u015fletmenizin t\u00fcm BT varl\u0131klar\u0131n\u0131n envanterini \u00e7\u0131kar\u0131r. Buna bilgisayarlar, sunucular ve yaz\u0131l\u0131mlardan bulut hizmetleri ve IoT cihazlar\u0131na kadar her \u015fey dahildir.<\/li>\n<li>Varl\u0131klar\u0131 \u00f6nem s\u0131ras\u0131na g\u00f6re \u00f6nceliklendirir; en de\u011ferli varl\u0131klar\u0131n\u0131z\u0131 belirler.<\/li>\n<li>Bilinen g\u00fcvenlik a\u00e7\u0131klar\u0131 i\u00e7in varl\u0131klar\u0131 tarar.<\/li>\n<li>G\u00fcvenlik a\u00e7\u0131\u011f\u0131 verilerini zenginle\u015ftirir. Bu, CVSS-B ve CVSS-BT derecelendirmelerinin iyile\u015ftirilmesini, tehdit istihbarat\u0131n\u0131n dahil edilmesini ve istismar olas\u0131l\u0131\u011f\u0131n\u0131n de\u011ferlendirilmesini i\u00e7erir. \u0130stismar edilebilirli\u011fi \u00f6l\u00e7mek i\u00e7in iki pop\u00fcler ara\u00e7; \u00e7o\u011fu g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in ger\u00e7ek d\u00fcnyada k\u00f6t\u00fcye kullan\u0131lma olas\u0131l\u0131\u011f\u0131n\u0131n y\u00fczdesini veren bir ba\u015fka FIRST derecelendirmesi olan <a href=\"https:\/\/www.first.org\/epss\/data_stats.html\" target=\"_blank\" rel=\"nofollow noopener\">EPSS<\/a> ve sald\u0131rganlar taraf\u0131ndan aktif olarak k\u00f6t\u00fcye kullan\u0131lan g\u00fcvenlik a\u00e7\u0131klar\u0131 hakk\u0131nda bilgi i\u00e7eren <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"nofollow noopener\">CISA KEV<\/a> gibi dan\u0131\u015fmanl\u0131k veren veri tabanlar\u0131d\u0131r.<\/li>\n<li>\u0130\u015f ba\u011flam\u0131n\u0131 tan\u0131mlar: Bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131ndan yararlan\u0131lmas\u0131n\u0131n savunmas\u0131z sistemler \u00fczerindeki potansiyel etkisini anlamak, yap\u0131land\u0131rmalar\u0131n\u0131 ve kurulu\u015funuzda nas\u0131l kullan\u0131ld\u0131klar\u0131n\u0131 g\u00f6z \u00f6n\u00fcnde bulundurmak gibi\u2026<\/li>\n<li>Yamalar ya da telafi edici \u00f6nlemler yoluyla g\u00fcvenlik zafiyetinin nas\u0131l n\u00f6tralize edilebilece\u011fini belirler.<\/li>\n<li>En heyecan verici k\u0131s\u0131m, i\u015f riskini de\u011ferlendirmek ve toplanan t\u00fcm verilere dayanarak \u00f6ncelikleri belirlemektir. En y\u00fcksek k\u00f6t\u00fcye kullan\u0131m olas\u0131l\u0131\u011f\u0131na ve \u00f6nemli BT varl\u0131klar\u0131n\u0131z \u00fczerinde olas\u0131 \u00f6nemli etkiye sahip g\u00fcvenlik a\u00e7\u0131klar\u0131na \u00f6ncelik verilir. G\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 s\u0131ralamak i\u00e7in, toplanan t\u00fcm verileri \u00c7evresel bile\u015fene dahil ederek CVSS-BTE\u2019yi hesaplayabilir veya alternatif s\u0131ralama metodolojileri kullanabilirsiniz. D\u00fczenleyici hususlar da \u00f6nceliklendirmeyi etkiler.<\/li>\n<li>Risk seviyesine ve g\u00fcncellemeler i\u00e7in en uygun zaman gibi operasyonel hususlara dayal\u0131 olarak her bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n \u00e7\u00f6z\u00fcm\u00fc i\u00e7in son tarihleri belirler. G\u00fcncellemeler veya yamalar mevcut de\u011filse veya bunlar\u0131n uygulanmas\u0131 yeni riskler ve karma\u015f\u0131kl\u0131klar ortaya \u00e7\u0131kar\u0131yorsa, do\u011frudan iyile\u015ftirme yerine telafi edici \u00f6nlemler al\u0131n\u0131r. Bazen, bir g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 d\u00fczeltmenin maliyeti, olu\u015fturdu\u011fu riskten daha a\u011f\u0131r basar ve bu a\u00e7\u0131\u011f\u0131n hi\u00e7 d\u00fczeltilmemesine karar verilebilir. Bu gibi durumlarda i\u015fletme, g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131n istismar edilmesi riskini bilin\u00e7li olarak kabul eder.<\/li>\n<\/ul>\n<p>Bahsettiklerimize ek olarak, \u015firketinizin g\u00fcvenlik a\u00e7\u0131\u011f\u0131 ortam\u0131n\u0131 ve BT altyap\u0131s\u0131n\u0131 periyodik olarak analiz etmek \u00e7ok \u00f6nemlidir. Bu analizin ard\u0131ndan, t\u00fcm g\u00fcvenlik a\u00e7\u0131\u011f\u0131 s\u0131n\u0131flar\u0131n\u0131n istismar edilmesini \u00f6nleyen veya belirli BT sistemlerinin genel g\u00fcvenli\u011fini \u00f6nemli \u00f6l\u00e7\u00fcde art\u0131ran siber g\u00fcvenlik \u00f6nlemleri alman\u0131z gerekir. Bu \u00f6nlemler aras\u0131nda a\u011f mikro segmentasyonu, en az ayr\u0131cal\u0131k uygulamas\u0131 ve daha s\u0131k\u0131 hesap y\u00f6netimi ilkelerinin benimsenmesi say\u0131labilir.<\/p>\n<p>Do\u011fru \u015fekilde uygulanan bir RBVM s\u00fcreci, BT ve g\u00fcvenlik ekipleri \u00fczerindeki y\u00fck\u00fc b\u00fcy\u00fck \u00f6l\u00e7\u00fcde azalt\u0131r. \u00c7abalar\u0131 \u00f6ncelikle i\u015fletme i\u00e7in ger\u00e7ek bir tehdit olu\u015fturan kusurlara y\u00f6nelik oldu\u011fu i\u00e7in zamanlar\u0131n\u0131 daha etkili bir \u015fekilde harcarlar. Bu verimlilik kazan\u0131mlar\u0131n\u0131n ve kaynak tasarruflar\u0131n\u0131n \u00f6l\u00e7e\u011fini kavramak i\u00e7in bu <a href=\"https:\/\/www.first.org\/epss\/model\" target=\"_blank\" rel=\"nofollow noopener\">FIRST \u00e7al\u0131\u015fmas\u0131n\u0131<\/a> inceleyebilirsiniz. Yaln\u0131zca EPSS kullanarak g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 \u00f6nceliklendirmek, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n yaln\u0131zca %3\u2019\u00fcne odaklanarak %65 verimlilik elde etmenizi sa\u011flar. Tam tersine, CVSS-B\u2019ye g\u00f6re \u00f6nceliklendirme, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n %57\u2019sinin %4\u2019l\u00fck bir etkinlikle ele al\u0131nmas\u0131n\u0131 gerektirmektedir. Burada \u201cverimlilik\u201d, ger\u00e7ekte k\u00f6t\u00fcye kullan\u0131lm\u0131\u015f olan g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131n ba\u015far\u0131l\u0131 bir \u015fekilde ortadan kald\u0131r\u0131lmas\u0131 anlam\u0131na gelmektedir.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kesb-trial-leadgen\">\n","protected":false},"excerpt":{"rendered":"<p>Bu yaz\u0131m\u0131zda; Common Vulnerability Scoring System derecelendirmelerindeki tutars\u0131zl\u0131klar\u0131n nedenlerini, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 \u00f6nceliklendirmesi i\u00e7in CVSS kullan\u0131rken yap\u0131lan yayg\u0131n hatalar\u0131 ve bunun nas\u0131l do\u011fru yap\u0131laca\u011f\u0131n\u0131 ele al\u0131yoruz.<\/p>\n","protected":false},"author":2722,"featured_media":13592,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1726,1194],"tags":[2796,2795,790,519,2475,2377],"class_list":{"0":"post-13591","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-enterprise","8":"category-business","9":"tag-ciso","10":"tag-cvss","11":"tag-guvenlik-aciklari","12":"tag-ipuclari-2","13":"tag-strateji","14":"tag-yamalar"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/cvss-rbvm-vulnerability-management\/13591\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cvss-rbvm-vulnerability-management\/29225\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/24403\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/12606\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cvss-rbvm-vulnerability-management\/29236\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/28339\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/cvss-rbvm-vulnerability-management\/31177\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/cvss-rbvm-vulnerability-management\/29856\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/cvss-rbvm-vulnerability-management\/40090\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cvss-rbvm-vulnerability-management\/53912\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/cvss-rbvm-vulnerability-management\/22997\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/cvss-rbvm-vulnerability-management\/24033\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/cvss-rbvm-vulnerability-management\/32454\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/cvss-rbvm-vulnerability-management\/29382\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cvss-rbvm-vulnerability-management\/35159\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cvss-rbvm-vulnerability-management\/34799\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/guvenlik-aciklari\/","name":"g\u00fcvenlik a\u00e7\u0131klar\u0131"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13591"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13591\/revisions"}],"predecessor-version":[{"id":13594,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13591\/revisions\/13594"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13592"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}