15CONCLUSION

Image

Throughout this guide, you’ve built a complete vulnerability management system from scratch using freely available tools and some Python “glue.” In the process, I hope you’ve transformed your organization’s approach to vulnerability management. But before you close this book, let’s look back at where we’ve been and then look forward to other improvements you might make to your system in the future.

A Look Back

Think about what you wanted to achieve when you first chose this book and started reading. Perhaps you’re an IT administrator for a small business who realized that you needed to systematize your patching cycle. Or maybe you’re ...

Get Practical Vulnerability Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.