8.2. Before the Workshop: Run Vulnerability Evaluation Tools on Selected Infrastructure Components
The focus of this activity rests squarely on the computing infrastructure. You goal is to make sure that each component you selected during process 5 is evaluated against known technological weaknesses to see which are present in that component.
Staff members from your information technology department, or possibly external experts, take lead roles in process 6. Remember, it takes specialized information technology and security knowledge to run the tools and interpret the results. You need to make sure that you have the right people engaged in this part of the evaluation.
Step 1: Run Vulnerability Evaluation Tools
In this step you conduct the vulnerability ...