Planning
Up to this point, I have discussed the various aspects of vulnerability management (VM) and their relevance to the overall VM process. I have also described the broader role of VM in an organization's risk management function and maintenance of security posture. Many of the individual stages of implementing VM have been described, such as the development of policies, processes, and requirements. But what is needed now are a project plan, checklists, and strategies to get the program off the ground.
This chapter will provide you with the checklists, plans, strategies, and advice to help you develop a complete VM program in a large, globally distributed company. Some selectivity and tailoring will be required ...
Get Vulnerability Management, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.