Vulnerability Management Maturity Model

This conclusion presents some closing thoughts on the concepts covered in the preceding chapters of this book. The book covers vulnerability management from asset and patch management to scoring and prioritization, all the way through threat intelligence and human factors. It lays the foundation for...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hughes, Chris, Robinson, Nikki
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This conclusion presents some closing thoughts on the concepts covered in the preceding chapters of this book. The book covers vulnerability management from asset and patch management to scoring and prioritization, all the way through threat intelligence and human factors. It lays the foundation for the development of a maturity model that organizations can implement for their vulnerability management program (VMP). Much like other cybersecurity aspects such as zero trust, vulnerability management is an iterative process of continuous improvement, refinement, and learning. Without a proper asset management strategy and inventory, a VMP will not succeed. A comprehensive VMP has a mature and focused secure configuration strategy. Continuous monitoring (ConMon) is integral to the success of a mature VMP. ConMon is the practice of reviewing vulnerabilities, alerts, incidents, and processes over time.
DOI:10.1002/9781394277155.ch12