Partial preview of the text
Download Vulnerability Management and more Essays (university) Computer Vision in PDF only on Docsity!
deity IP addresses weh = isk rating. [vulnerability scans process letars at the beginning of every Jauaner levery 3 montney Reschadie scan or establish busmess case far exeption deity IP addresses not to ba sranned listaf IP ackiresses so be scanned Emer seens la be pesformed in ehange control for approval Begin wulnerability sean dafined in change contra! documented Bocument [vuinerability we false positive or has a business cane Vulnerability scans can lake several bats 9 complete. Check tool and netwnrk ter activity, Ht systom is hung try breaking up the scans Stop vulnerabitsy Cheek Tor ‘Vulnerability scan complatas, ‘Vulnerability sean policy is defined by ‘what risk levels are included in the (Generate repo, based aff of currant [vuinersbitity policy report, Currant policy ts that al critical ‘or high vuineraniiities must be in thie report System custodians ravinw results of ‘vulnerability saan All vulnerabilties are initially marked #3 “Oper ‘Send repoct i system custodians and impart results (wie database ‘Vulnerabilities with plan ramedabon plan are marked ag “Pending® Bocument remediaban plan provided by system custodians Vulnersbilines which nave been ramegisted or have 4 documemed business case are are marked as ‘Clased” imporwUpdate documentation ime database linpart/Update documentaton imedatabose Vulnarapitines wih planted remediation sre marked as “Pending”