Implementing Vulnerability Management Processes
In this chapter you will learn:
• The requirements for a vulnerability management process
• How to determine the frequency of vulnerability scans you need
• The types of vulnerabilities found in various systems
• Considerations when configuring tools for scanning
Of old, the expert in battle would first make himself invincible and then wait for his enemy to expose his vulnerability.
Vulnerability Management Requirements
Like many other areas in life, vulnerability management involves a combination of things we want to do, things we should do, and things we have to do. Assuming you don’t need help with the first, we’ll focus our attention for this chapter on the latter two. ...