Configuring and Executing Vulnerability Scans
Whether scans are being performed by cybersecurity analysts focused on building a lasting vulnerability management program or penetration testers conducting a one-off scan as part of a test, administrations must configure vulnerability management tools to perform scans according to the requirements-based scan specifications. These tasks include identifying the appropriate scope for each scan, configuring scans to meet the organization’s requirements, and maintaining the currency of the vulnerability scanning tool.
Scoping Vulnerability Scans
The scope of a vulnerability scan describes the extent of the scan, including answers to the following questions:
- What systems, networks, services, applications, and protocols will be included in the vulnerability scan?
- What technical measures will be used to test whether systems are present on the network?
- What tests will be performed against systems discovered by a vulnerability scan?
When...