Vulnerability Management
Vulnerability Management
1. Introduction to Vulnerabilities
o Data exfiltration
o Ransomware deployment
2. Key Terms
Example:
o Format: CVE-YYYY-XXXX
2. Temporal Metrics:
3. Environmental Metrics:
Vulnerability Management
IT Risk/Compliance
Patching/Infrastructure
Steps:
1. Discover:
Remote scans
Agent-based scans
2. Prioritize Assets:
Public facing
4. Report:
o Create clear, actionable reports
5. Remediate:
6. Verify:
5. Scanning Strategies
Types of Scans:
1. Remote Scans:
o Conducted externally
2. Agent-Based Scans:
3. Authenticated Scans:
4. Unauthenticated Scans:
o No credentials used
o Surface-level analysis
Steps to manage: