Effective Remediation of Network Vulnerabilities & Policy Compliance

Consistent, ongoing execution of vulnerability management and policy compliance is difficult, if not impossible to do on a manual basis. There are simply too many ""moving parts"" to juggle and act on in a timely and cost-effective manner. This guide provides a step-by-step guide for automating the vulnerability and compliance workflow process. 8 step vulnerability and compliance workflow: 1. Create security policies and controls 2. Track inventory and categorize assets 3. Scan systems for vulnerabilities 4. Compare vulnerabilities against inventory 5. Classify and rank risks 6. Pre-test patches, fixes and workarounds 7. Apply patches, fixes and workarounds 8. Re-scan to confirm fixes and verify compliance

Provided by: Qualys Topic: Security Date Added: Jan 2010 Format: PDF

Find By Topic