SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Six Steps in Effective Vulnerability Management

For IT enabled organizations, servers, storage devices, desktops, laptops, etc., are their critical assets, as it
is where organizations’ critical and vital digital information generally reside. These systems are
therefore,vulnerable to cyber-attacks, both internal and external.It is very important for organizations to
take necessary measures to protect their assets from any kinds of risks through a proper implementation
of an effective vulnerability management solution. Such a move would not only guarantee a secure IT
environment but also improve the company’s regulatory compliance position. Wikipedia defines
Vulnerability Management as “cyclical practice of identifying, classifying, remediating, and mitigating
vulnerabilities.”Hence vulnerability management is not a point-in-time event but an on-going process
that protects company’svaluable data, customer information, critical network assets, and intellectual
property.


The need for an effective vulnerability management solution gains importance with the fact that
organizations, can no longer afford to remain complacent in the face of Government regulations, financial
implications, and loss of reputation.For instance, in healthcare compliance with HIPAA and HITECH are
necessary to avoid penalties.


Gartner, an information technology research and advisory firm, defines six points to help organizations in
evolving an effective vulnerability management program.


1.    Define Policies
As a first step,organizations must define their information security and compliance policies and actions
steps to reach and maintain the desired state of security and compliance related to their environment.
This includes at a fundamental level, determining device configurations, user identity, and resource
access. There are more.


2.    Baseline the Environment
After defining the policies, organizations must gauge their current security state with reference to their
environment and baseline the threshold limits.


3.    Prioritize
Once the vulnerabilities are identified, organizations must prioritize thembased on a combination of
riskimpacts and efforts.


4.    Shield
In the meantime,organizationscan reduce the effect of damage caused by these vulnerabilities by shielding
the environment using desktop and network security tools.
5.    Mitigate
Organizations must choose mitigation strategies and activities to manage external threats, and internal
security posture,based on critical-asset classification. These mitigation activities should address and
eliminate the root causes of vulnerabilities. This can be done through patching vulnerable services,
changing vulnerable configurations, or making application updates to remove vulnerable code.


6.    Maintain and Monitor
Since an organization’s computing environment, security policies,and practices change over time, based
on assessed vulnerabilities and their impact, steps should be taken to ensure continuous monitoring of the
environment for any significant changes of significant impact.


Also read on - IT Compliance, Threat management

Mais conteúdo relacionado

Mais de Aegify Inc.

Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
Aegify Inc.
 

Mais de Aegify Inc. (13)

eGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks securityeGestalt presents at RSA 2013, where the world talks security
eGestalt presents at RSA 2013, where the world talks security
 
Security Posture Management Enters the Cloud
Security Posture Management Enters the CloudSecurity Posture Management Enters the Cloud
Security Posture Management Enters the Cloud
 
eGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with AegifyeGestalt Announces Next Generation Security Posture Management with Aegify
eGestalt Announces Next Generation Security Posture Management with Aegify
 
Implications of hipaa non compliance
Implications of hipaa non complianceImplications of hipaa non compliance
Implications of hipaa non compliance
 
Address Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and ButsAddress Threat Management - No Ifs and Buts
Address Threat Management - No Ifs and Buts
 
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM ChanneleGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
eGestalt Named a 2012 ‘Emerging Vendor’by CRN and UBM Channel
 
IT Compliance and Security Solutions
IT Compliance and Security SolutionsIT Compliance and Security Solutions
IT Compliance and Security Solutions
 
SecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECHSecureGRC SB™ HIPAA and HITECH
SecureGRC SB™ HIPAA and HITECH
 
Webinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industryWebinar on HIPAA/HITECH compliance services for healthcare industry
Webinar on HIPAA/HITECH compliance services for healthcare industry
 
Importance of Healthcare Compliance Solutions
Importance of Healthcare Compliance SolutionsImportance of Healthcare Compliance Solutions
Importance of Healthcare Compliance Solutions
 
Key featuresofcloudbasedsaas
Key featuresofcloudbasedsaasKey featuresofcloudbasedsaas
Key featuresofcloudbasedsaas
 
NetWitness Decoder
NetWitness DecoderNetWitness Decoder
NetWitness Decoder
 
SecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRCSecureGRC: Unification of Security Monitoring and IT-GRC
SecureGRC: Unification of Security Monitoring and IT-GRC
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Six Steps in Effective Vulnerability Management

  • 1. Six Steps in Effective Vulnerability Management For IT enabled organizations, servers, storage devices, desktops, laptops, etc., are their critical assets, as it is where organizations’ critical and vital digital information generally reside. These systems are therefore,vulnerable to cyber-attacks, both internal and external.It is very important for organizations to take necessary measures to protect their assets from any kinds of risks through a proper implementation of an effective vulnerability management solution. Such a move would not only guarantee a secure IT environment but also improve the company’s regulatory compliance position. Wikipedia defines Vulnerability Management as “cyclical practice of identifying, classifying, remediating, and mitigating vulnerabilities.”Hence vulnerability management is not a point-in-time event but an on-going process that protects company’svaluable data, customer information, critical network assets, and intellectual property. The need for an effective vulnerability management solution gains importance with the fact that organizations, can no longer afford to remain complacent in the face of Government regulations, financial implications, and loss of reputation.For instance, in healthcare compliance with HIPAA and HITECH are necessary to avoid penalties. Gartner, an information technology research and advisory firm, defines six points to help organizations in evolving an effective vulnerability management program. 1. Define Policies As a first step,organizations must define their information security and compliance policies and actions steps to reach and maintain the desired state of security and compliance related to their environment. This includes at a fundamental level, determining device configurations, user identity, and resource access. There are more. 2. Baseline the Environment After defining the policies, organizations must gauge their current security state with reference to their environment and baseline the threshold limits. 3. Prioritize Once the vulnerabilities are identified, organizations must prioritize thembased on a combination of riskimpacts and efforts. 4. Shield In the meantime,organizationscan reduce the effect of damage caused by these vulnerabilities by shielding the environment using desktop and network security tools.
  • 2. 5. Mitigate Organizations must choose mitigation strategies and activities to manage external threats, and internal security posture,based on critical-asset classification. These mitigation activities should address and eliminate the root causes of vulnerabilities. This can be done through patching vulnerable services, changing vulnerable configurations, or making application updates to remove vulnerable code. 6. Maintain and Monitor Since an organization’s computing environment, security policies,and practices change over time, based on assessed vulnerabilities and their impact, steps should be taken to ensure continuous monitoring of the environment for any significant changes of significant impact. Also read on - IT Compliance, Threat management