This chapter covers the following topics:
2.0 Vulnerability Management
2.1 Given a scenario, implement an information security vulnerability management process
Identification of Requirements: Discusses the process of establishing the requirements of a vulnerability assessment.
Establish Scanning Frequency: Covers factors affecting scanning frequency, such as risk appetite, regulatory requirements, technical constraints, and workflow.