Vulnerability management has a top-to-bottom approach. The following are the stakeholders that might be involved in and/or impacted by the vulnerability assessment:
- Executive/top management: To achieve the desired success in the vulnerability assessment program, top management should support the activity by allocating all required resources.
- IT security head: This could be dedicated or additional responsibility assigned to the competent personnel. Usually, this position directly reports to executive/top management, providing a bird's-eye view of security posture to the top management. In order to maintain security compliance, this position leads multiple IT security programs run in an organization.
- VA lead tester ...