Vulnerability Scan
Vulnerability Assessment
- Assessing aspects of system 
- OS (benchmark scan) 
- Network connections 
- Database connections 
- Inbound/outbound communication 
- Libraries used by applications and system 
- Is working according to security requirements and recommendation (Compliance) 
- Developing the scope 
 
Vulnerability Management
- Periodical Process to find, fix and remediate 
- Need to run external scan every day 
- Host discovery 
 
Value Chain Analysis
- What is critical for our services 
Learn about environment
- Build your scope according to that 
- Plan engagement 
Identify
- Threat modeling 
- Discover environment 
https://msrc.microsoft.com/update-guide/en-us
https://www.microsoft.com/en-us/msrc?rtc=1
https://patchtuesdaydashboard.com/
https://cve.mitre.org/about/index.html
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
https://owasp.org/www-project-top-ten/
Last updated
Was this helpful?