213
7
ex e c u t I o n , re p o r t I n g ,
a n d an a l y S I S
7.1 Introduction
What should be obvious by now is that the vulnerability management
(VM) process and technology cannot be managed without accurate
and actionable information. At the end of this chapter, you should
be able to decide what kinds of reports you will need for your orga-
nization. You should also be able to specify the contents and format
of the reports to make your processes more efficient. In the previous
chapter, we discussed process. ese processes must be supported and
monitored with actionable information as input. When a manager
responsible for VM needs to determine the most important areas of
the IT infrastructure to remediate, the information must be readily