Week 2: Vulnerability management
In week 2, we learned about vulnerability management activities and tools for managing vulnerabilities. The chapter covered various considerations before running the scans, including defining the scanning parameters and criteria. The chapters focused on many parameters like the risk associated with scanning activities since there are lots of things that need to be done before running the activities, like the data classification, the impact of the scan that can happen in the current business, and ensuring the firewall doesn’t interfere with the scan or the scan doesn’t mess with the firewall settings vice versa.
The chapter
discusses the remediation of vulnerabilities once the scan is complete,
including the remediation process, such as prioritizing vulnerabilities,
patching, and hardening them.
After
reading the chapters, I learned that running a vulnerability scan is not that simple and requires thoughtful, methodical planning involving the entire senior
leadership and the cybersecurity team.