Understanding vulnerability management
Vulnerability management is like tending a garden. Just as a gardener watches his garden for weeds, vulnerability management watches the IT estate for vulnerabilities.
Flash presentation
- IT specialists
- Managers
- Direction
- Vulnerability management involves the identification, assessment and correction of security vulnerabilities in a network
- It uses scanning tools to detect these vulnerabilities and may apply patches or install updates
- Its objective is to strengthen host security and prevent cyber attacks.
Managed vulnerability management reduces the workload by outsourcing:
- Configuration of detection tools
- Training on the various detection tools
- Regular monitoring tasks
- False positive detection tasks
- Prioritisation of tasks
- Remediation proposals
- Reporting to decision-makers
- Vulnerability tracking.
- Vulnerability management is a structured process for identifying and mitigating risks in your systems
- It includes regular assessments, remediation plans and training for teams
- It is essential for proactively undermining operational risks and ensuring regulatory compliance.
- The managed approach has a reduced cost of scale compared with recruitment, training and the purchase of dedicated tools
- Managed vulnerability management reduces security risks by drawing on external expertise
- It enables internal resources to be optimised while guaranteeing optimum protection.
- Vulnerability management is a cornerstone of the company’s security strategy
- It plays a part in protecting the reputation and trust of customers
- Vulnerability management integrates advanced security practices and proactive risk management
- It enables security to be aligned with the company’s strategic objectives.
- Managed vulnerability management is a strategic solution that outsources the monitoring and correction of vulnerabilities by calling on experts
- It ensures the protection of assets and supports the company’s growth and sustainability.
Note
Vulnerability management is also an integral part of regulatory compliance, such as RGPD, NIS2, PCI DSS, ISO27001 or DORA.
The vulnerability management process
This diagram illustrates the vulnerability management process:
flowchart TD A[Network prioritization] --> B(Host prioritization) B --> C(Install scanners/agents) C --> D(Map the network) D --> E(Scan hosts for vulnerabilities) E --> F(Remove false positives) F --> G(Data enrichment) G --> H(Risk assessment and vulnerability prioritization) H --> I(Communication with the client) I --> J(Support with remediation/resolution) J --> K{Any modification to make?} K -- Yes --> A K -- No --> D K -- Every X period --> A
Life cycle of a vulnerability
This diagram illustrates the different stages in the treatment of a vulnerability:
flowchart TD A[Detected] --> B(Enriched) B --> C(Analyzed) C --> D(Assigned) D --> E(In progress) E --> F(Validated) E --> G(False positive) G --> H(Closed) F --> I(Mitigated) I --> J(Periodic review) F --> K(Resolved) K --> H F --> L(Risk accepted) L --> J J --> M(A change?) M -- Yes --> C M -- No --> J H --> J
Some players have different backgrounds in their vulnerability management process. It is important to define this process together, in line with the internal workings of the company.