8.2. Before the Workshop: Run Vulnerability Evaluation Tools on Selected Infrastructure Components
The focus of this activity rests squarely on the computing infrastructure. You goal is to make sure that each component you selected during process 5 is evaluated against known technological weaknesses to see which are present in that component.
Staff members from your information technology department, or possibly external experts, take lead roles in process 6. Remember, it takes specialized information technology and security knowledge to run the tools and interpret the results. You need to make sure that you have the right people engaged in this part of the evaluation.
Step 1: Run Vulnerability Evaluation Tools
In this step you conduct the vulnerability ...
Get Managing Information Security Risks: The OCTAVESM Approach now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.