8.2. Before the Workshop: Run Vulnerability Evaluation Tools on Selected Infrastructure Components

The focus of this activity rests squarely on the computing infrastructure. You goal is to make sure that each component you selected during process 5 is evaluated against known technological weaknesses to see which are present in that component.

Staff members from your information technology department, or possibly external experts, take lead roles in process 6. Remember, it takes specialized information technology and security knowledge to run the tools and interpret the results. You need to make sure that you have the right people engaged in this part of the evaluation.

Step 1: Run Vulnerability Evaluation Tools

In this step you conduct the vulnerability ...

Get Managing Information Security Risks: The OCTAVESM Approach now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.