186 Vulnerability ManageMent
password requires change. Such changes can often impact other sys-
tems that rely on the particular configuration of the target.
6.2.6 Monitor and Adjust
By reviewing the results of the audit, problems can be identified and
parameters altered to prevent potential disruptions of service and to
increase accuracy. Networks, target configurations, and organiza-
tions are dynamic. What worked today may not work tomorrow. So,
some amount of monitoring of results and performance is necessary to
assure smooth operation. It is not unusual for a network manager to
add VLANs and remap IP addresses of hosts, with the change going
unnoticed by the security and audit groups. ese types of changes
should be identified and address ...