Vulnerability Management Flashcards
Vulnerability Lifecycle
What is the first step in the VM Lifecycle?
- Identification
Finding vulnerabilities in systems, applications and networks
What is the second step in the VM Lifecycle?
- Classification
Categorizing vulnerabilities based on type and severity
What is the third step in the VM Lifecycle?
- Analysis
Assessing the impact and risk level from 1-10 (CVSS)
What is the fourth step in the VM Lifecycle?
- Prioritization
Determining which vulnerabilities to fix first based on risk
What is the fifth step in the VM Lifecycle?
- Reporting
Documenting vulnerabilities, findings & remediation plans
What is the sixth step in the VM Lifecycle?
- Remediation
Applying fixes, patches (updating software), configuration changes or up
What is the seventh step in the VM Lifecycle?
- Mitigation
Reducing risk when a full fix isn’t immediately possible
What is the VM Lifecycle?
The VM Lifecycle is the process of identifying, classifying, analyzing, prioritizing, remediating, and mitigating vulnerabilities to reduce security risks in an organization.