Technology—Administration
Deploying these solutions is just the first step. A proactive regimen of scanning and remediation, strengthened by independent evaluation of your program, is an important part of securing your information systems. In addition, you must be able to demonstrate that you are making progress, and to do this, you need metrics in place to measure improvement in your processes.
Scanning and Remediation
As we discussed in Chapter 5, “Process,” a regular program of scanning your environment to identify and address vulnerabilities is quite important. Tools are available to help your organization prioritize the remediation effort.
Using these tools, you can classify your vulnerabilities into high, medium, and low priorities. You ...
Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.