the Vulnerability exPerienCe 39
Now, once a change is completed, the change ticket is closed. At
Abacus, the ticket is closed but not the incident. First, a scan must
be performed on the system to verify the remediation success. In this
example, the strength of the password would be tested. If the vulner-
ability is no longer present, then the incident is manually closed.
So, we have now performed four manual tasks that could have been
automated. Follow this procedure in Figure 2.2. e boxes are shaded
to indicate which steps are manual and which are automated. ere
is little to no automation in this diagram. e diagram has numbers,
which correspond to the following:
1. A vulnerability manager reviews a report to identify critical
vulnerab ...