7. Vulnerability Scanning Flashcards
What is vulnerability management?
vulnerability management
The process of handling security vulnerabilities in modern computing systems and applications.
Core goal of vulnerability management
vulnerability management
Ensuring the security of systems by developing and implementing measures to address vulnerabilities.
Steps in vulnerability management
vulnerability management
Analyzing vulnerabilities, developing patches, releasing and applying patches to systems.
Challenges in vulnerability management
vulnerability management
Dealing with complex software, multiple operating systems, numerous applications, and regular patching of various components.
Components of a mature vulnerability management process
vulnerability management
Vulnerability scanning, patch application, remediation tracking, and result reporting.
Regulatory requirements for vulnerability management
vulnerability management
Compliance with standards such as PCI DSS for credit card handling and FISMA for U.S. government agencies.
Types of vulnerability tests in an organization
vulnerability management
Network vulnerability scans, application scans, and specialized testing for web applications.
Supplementing vulnerability scans with other measures
vulnerability management
Reviewing system and application configurations, as well as logs, to validate scan results and identify false positives.
Importance of understanding organizational rules and requirements
vulnerability management
Designing a vulnerability management program that aligns with specific regulations and policies applicable to the organization.
What is the first step in developing a vulnerability management program?
Identify scan targets
Identify the requirements for the program.
Why is a reliable asset inventory important for vulnerability management?
Identify scan targets
It helps in creating a specific list of systems and networks to scan.
How can a vulnerability management solution be used for scanning targets?
Identify scan targets
Run a lightweight scan or use a platform like Nessus to identify systems on the local network.
What are the key considerations for prioritizing assets in vulnerability management?
Identify scan targets
Importance of data classification, level of risk exposure, and criticality to business operations.
Why is asset prioritization important even when scanning all systems regularly?
Identify scan targets
It helps in planning remediation efforts and allocating resources effectively.
DMZ Placement
Scan Perspective
Placing the scanner in the DMZ provides the clearest view of vulnerabilities on the target system.
Internet Placement
Scan Perspective
Placing the scanner on the internet gives an attacker’s view of the network, helping prioritize remediation efforts.
Firewall Impact
Scan Perspective
Firewall settings and filtering affect vulnerability scans by altering the systems and services visible to the scanner.
Intrusion Prevention Systems (IPS)
Scan Perspective
Active IPS on the network significantly influences scan results as vulnerability scanning traffic passes through it.
Agent-Based Scans
Scan Perspective
Agents installed on servers can probe server configurations deeply and report vulnerabilities to the central management system.
Credentialed Scanning
Scan Perspective
Providing credentials to the scanner allows it to log in and retrieve configuration information, offering an alternative to agent-based scanning.