Published: 23 October 2019
Summary
Vulnerability management, including vulnerability assessment, represents a proactive layer of enterprise security. VM remains challenging to many organizations, and this guidance presents a structured approach to VM best practices for security and risk management technical professionals.
Included in Full Research
- Vulnerability Defined
- Vulnerability Management and Vulnerability Assessment Defined
- Prework
- Define VM Process Scope
- Define Roles and Responsibilities
- Selecting Vulnerability Assessment Methods and Tools
- Create and Refine VM Policy and SLAs
- Identify Asset Context Sources
- Assess
- Identify Assets
- Scan for Vulnerabilities
- Prioritize
- Defining the Prioritization Method
- Use a Risk-Based Vulnerability Management Tool to Advance Prioritization
- Act
- Remediate
- Mitigate
- Accept Risk
- Reassess
- Validate Success and Rescan
- Improve
- Evaluate Metrics
- Eliminate Underlying Issues
- Evolve Processes and SLAs
- Existence of Unreported Vulnerabilities
- Trying to Fix All Identified Vulnerabilities
- Ineffective Communication
- Insufficient Remediation Resources
- Fixing Only “High” and “Critical” Vulnerabilities
- Conceding Broad or Eternal Exceptions
- Mitigation Without Previous Planning Can Be Disastrous