Vulnerability Management Maturity Model
This conclusion presents some closing thoughts on the concepts covered in the preceding chapters of this book. The book covers vulnerability management from asset and patch management to scoring and prioritization, all the way through threat intelligence and human factors. It lays the foundation for...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This conclusion presents some closing thoughts on the concepts covered in the preceding chapters of this book. The book covers vulnerability management from asset and patch management to scoring and prioritization, all the way through threat intelligence and human factors. It lays the foundation for the development of a maturity model that organizations can implement for their vulnerability management program (VMP). Much like other cybersecurity aspects such as zero trust, vulnerability management is an iterative process of continuous improvement, refinement, and learning. Without a proper asset management strategy and inventory, a VMP will not succeed. A comprehensive VMP has a mature and focused secure configuration strategy. Continuous monitoring (ConMon) is integral to the success of a mature VMP.
ConMon
is the practice of reviewing vulnerabilities, alerts, incidents, and processes over time. |
---|---|
DOI: | 10.1002/9781394277155.ch12 |