Vulnerability Scan
Vulnerability Assessment
Assessing aspects of system
OS (benchmark scan)
Network connections
Database connections
Inbound/outbound communication
Libraries used by applications and system
Is working according to security requirements and recommendation (Compliance)
Developing the scope
Vulnerability Management
Periodical Process to find, fix and remediate
Need to run external scan every day
Host discovery
Value Chain Analysis
What is critical for our services
Learn about environment
Build your scope according to that
Plan engagement
Identify
Threat modeling
Discover environment
https://msrc.microsoft.com/update-guide/en-us
https://www.microsoft.com/en-us/msrc?rtc=1
https://patchtuesdaydashboard.com/
https://cve.mitre.org/about/index.html
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
https://owasp.org/www-project-top-ten/
Last updated
Was this helpful?