© Morey J. Haber, Brad Hibbert 2018
Morey J. Haber and Brad HibbertAsset Attack Vectorshttps://doi.org/10.1007/978-1-4842-3627-7_18

18. Sample Vulnerability Plan

Morey J. Haber1  and Brad Hibbert2
Heathrow, Florida, USA
Carp, Ontario, Canada

This chapter outlines the vulnerability management policies and controls required to maintain high levels of system and application security in a diverse IT environment. It details the technology and procedures necessary for implementing a comprehensive, integrated program to detect and remediate vulnerabilities in operating systems, applications, mobile devices, cloud resources, and network devices to maintain maximum levels of security. It forms the written procedures and policy necessary for the Operations ...

Get Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.