Jump to ratings and reviews
Rate this book

Configuration Vulnerability Management Policy

Rate this book
This information security policy addresses requirements for the management of vulnerabilities created by human error in the configuration of the controls of a variety of system components. The vulnerabilities are very common and usually very easy to find and eliminate through simple scanning followed by error correction. Unfortunately they are also very easy for a modestly skilled attacker to find and exploit. The significant risk arising from the occurrence of the vulnerabilities can be minimized by active use of vulnerability assessment scanning technology. This policy applies a strategy of finding the vulnerability as soon after it was created as possible, correct the error that created the vulnerability as soon after finding it as possible and rescan the component to verify the correction was effective and no new errors were introduced. This is one of the few instances were an aggressive strategy of risk elimination is the only effective approach available.

34 pages, Kindle Edition

Published September 20, 2012

About the author

Chris Inskeep

42 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.