This chapter outlines the vulnerability management policies and controls required to maintain high levels of system and application security in a diverse IT environment. It details the technology and procedures necessary for implementing a comprehensive, integrated program to detect and remediate vulnerabilities in operating systems, applications, mobile devices, cloud resources, and network devices to maintain maximum levels of security. It forms the written procedures and policy necessary for the Operations ...
18. Sample Vulnerability Plan
Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.