Security

Effective Remediation of Network Vulnerabilities & Policy Compliance

Download Now Free registration required

Executive Summary

Consistent, ongoing execution of vulnerability management and policy compliance is difficult, if not impossible to do on a manual basis. There are simply too many ""moving parts"" to juggle and act on in a timely and cost-effective manner. This guide provides a step-by-step guide for automating the vulnerability and compliance workflow process. 8 step vulnerability and compliance workflow: 1. Create security policies and controls 2. Track inventory and categorize assets 3. Scan systems for vulnerabilities 4. Compare vulnerabilities against inventory 5. Classify and rank risks 6. Pre-test patches, fixes and workarounds 7. Apply patches, fixes and workarounds 8. Re-scan to confirm fixes and verify compliance

  • Format: PDF
  • Size: 279 KB