{"id":196,"date":"2011-08-09T11:11:00","date_gmt":"2011-08-09T11:11:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/08\/09\/control-10-continuous-vulnerability-assessment-and-remediation\/"},"modified":"2011-08-09T11:11:00","modified_gmt":"2011-08-09T11:11:00","slug":"control-10-continuous-vulnerability-assessment-and-remediation","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/control-10-continuous-vulnerability-assessment-and-remediation\/","title":{"rendered":"Control 10: Continuous Vulnerability Assessment and Remediation"},"content":{"rendered":"
Is it possible to have a vulnerability assessment program that truly can be considered continuous? I believe the answer is a resounding yes you can.<\/p>\n
Configure a network scanner to perform daily discovery scans on the internal and external networks. Review the output for new hosts and unexpected services. Make certain that these scans are detected by your security controls, such as Network Intrusion Detection (NIDS) and file monitoring tools. This technique is very valuable and will help assess the maturity of the continuous monitoring program.<\/p>\n
The free Microsoft Windows Server Update Services (WSUS) provides automated patching of Microsoft products. The administrator can schedule categories of patches and schedule their installation. Also included is a reporting capability. WSUS can send daily reports via email to administrators notifying them of new patch releases and the status of their installation.<\/p>\n
Ensure that after patches are applied that you verify outside the patching tool that the patch has actually been applied. Look for clues such as registry values, installed programs and the last system reboot to help measure this control.<\/p>\n
Even if in a simple spreadsheet format, track all open vulnerabilities across each system type. If you get to the point where you do not know what task to work on next, this will serve as an excellent guide to direct your attention. This will help move your security program to a more mature state. <\/p>\n","protected":false},"excerpt":{"rendered":"
Is it possible to have a vulnerability assessment program that truly can be considered continuous? I believe the answer is a resounding yes you can. Configure a network scanner to perform daily discovery scans on the internal and external networks. Review the output for new hosts and unexpected services. Make certain that these scans are […]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[20,21,22],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\n