Vulnerability Management Process
May 12, 2010New Assets, Technologies, Patches, Configurations Discovered
Tracked by:
Spreadsheets
Asset Inventory System
New Vulnerabilities and Threats Discovered
Validated by:
Alerts
Web Site Research
Information Collected and Validated
Remediation:
Database
Spreadsheet
Validation Tests
Correlate Vulnerabilities to Assets
Deployment
Validated by:
Risk Analysis Tools
Develop Critical Vulnerability and Threat Risk-Ranked List
Asset Inventory System
Remediate tracking:
Help Desk Patch Management System
Verification and Monitoring Accountability
Spreadsheets Help Desk
www.bestitdocuments.com