Chapter 6

Process

Process is a critical component of any successful security program. It is integrated into the organization to support policy and, by extension, the program charter. Process guides the use of technology but is not a servant to it. This distinction is important because, too often, processes are designed purely to operate technology rather than produce the outcome that supports the organization's objectives. The result is a series of ad hoc revisions to processes once they are implemented.

Process development need not be a long, drawn-out affair. With a basic framework of process, 90% of the work can be done quickly. In this chapter, we will discuss the steps in the vulnerability management (VM) process and how ...

Get Vulnerability Management, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.