The bottom-up approach is where the ground-level staff initiate action to implement the new initiative. Speaking in the context of the vulnerability management program, the action flow in a bottom-up approach would look something similar to the following:
- A junior team member of the system administrator team identifies some vulnerability in one of the systems
- He reports it to his supervisor and uses a freeware tool to scan other systems for similar vulnerabilities
- He consolidates all the vulnerabilities found and reports them to his supervisor
- The supervisor then reports the vulnerabilities to higher management
- The higher management is busy with other activities and therefore fails to prioritize the vulnerability remediation