303
10
Su m m a r y
10.1 Introduction
e process of vulnerability management (VM) can seem complex
but the benefits are significant. ere is little doubt that vulnerabili-
ties, misconfigurations, and patches will not end anytime soon. Early
in the formation of the VM industry, the process of scan, remediate,
verify, and repeat was viewed as proactive security. e simple idea
was to identify the vulnerabilities before the enemy could, and clean
them up. For years this approach was accepted as common sense.
Since many vendors started, the competition has been to see who
can identify and include the most vulnerability checks.
Like intrusion detection systems (IDS), the problem of false posi-
tives became an issue. Sales materials from major VM vendors ...