Chapter 11

Summary and the Future

The process of vulnerability management (VM) can seem complex, but this is misleading when one looks at the technical details. There is little chance that vulnerabilities, misconfigurations, and urgency of patching will end anytime soon. Early in the formation of the vulnerability management industry, the process of scan, remediate, verify, repeat was viewed as proactive security. The simple idea was to identify the vulnerabilities before the enemy would and clean them up. This approach for years was accepted as common sense.

Since many vendors offer solutions, the competition has been to see who can identify and include the most vulnerability checks.

Like intrusion detection systems (IDSs), ...

Get Vulnerability Management, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.