Week 2: Vulnerability management


 

In week 2, we learned about vulnerability management activities and tools for managing vulnerabilities. The chapter covered various considerations before running the scans, including defining the scanning parameters and criteria. The chapters focused on many parameters like the risk associated with scanning activities since there are lots of things that need to be done before running the activities, like the data classification, the impact of the scan that can happen in the current business, and ensuring the firewall doesn’t interfere with the scan or the scan doesn’t mess with the firewall settings vice versa.

The chapter discusses the remediation of vulnerabilities once the scan is complete, including the remediation process, such as prioritizing vulnerabilities, patching, and hardening them.

After reading the chapters, I learned that running a vulnerability scan is not that simple and requires thoughtful, methodical planning involving the entire senior leadership and the cybersecurity team. 

Popular posts from this blog

Week1: Introduction and Cloud Computing

Week 12: Tools for Monitoring Network and Blog Wrap-up

Week 3: Migration to the Cloud