Summary

This was a very long chapter that has just briefly covered how we can improve our communication of vulnerabilities and remediation efforts in order to enable cyber intelligence through multiple stakeholders. We should be aware that VM has a huge dependency on the inventory of applications and systems being correct, or we risk missing things that should be accounted for in our scanning. By improving our scanning coverage and through the identification of high to low impact applications/systems that exist on our network, we can then begin prioritizing how we can fix vulnerabilities by customizing the reporting that we provide for the remediation personnel. Finally, by understanding the prioritization of remediation efforts, the work being completed allows us to have an input into our security state analysis capability in order to inform the tactical and strategic levels of leadership about our posture. 

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.133.134.151