Time
1 hour 23 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:02
In the last video, we talked about the use of consultants and automation of vulnerability management.
00:07
We also discussed somewhat common tools and used for vulnerability. Manager.
00:11
In this video, we're going to talk about priority arising. Remediation of on abilities
00:18
following objectives We're gonna talk about priority arising. Remediation
00:22
and the vulnerability reporting.
00:26
Let's look at our pre assessment.
00:28
What does vulnerability management identify?
00:31
Is it a
00:33
perimeter and internal weaknesses? Be only perimeter weaknesses or a seat only internal weaknesses?
00:43
The correct answer here is a
00:46
vulnerability. Imagine that helps you identify weaknesses on boat to perimeter and internal network.
00:55
So it's like a prior to rise and remediation. So we're gonna cover level one, which is minimal.
01:00
Level two, which is medium
01:00
level three, which is serious. Level four, which is critical and level firewood. Just urgent.
01:07
So let's jump right on it.
01:08
So first we're gonna go head to cover Level one, which is minimal
01:11
in this level of vulnerability scanning. Some information can be collected from a target system,
01:18
but it's not a critical system, and information obtained has little value.
01:23
We still need to perform remediation of these one abilities, but they are not critical tow business operations.
01:30
Now let's look at Level two medium
01:34
and this level the target system, maybe a critical system,
01:38
but they're for made obtain. Its Onley moderately helpful,
01:42
such as a version of sulfur applications or the operating system and use.
01:49
And Yvonne ability discovered needs to be re mediated. But there is likely not an urgency for the organization to do so.
01:59
Now let's look at Level three, Siri's.
02:02
In this level, the target system is likely critical system.
02:07
There are indicators of a threat. Actor.
02:09
This could include things like directory browsing,
02:13
the reading of files and in dollars service or distributed denial of service attacks.
02:19
Any vulnerabilities discovered needed to be remediated. Quick.
02:23
Let's look at Level four
02:27
and level forward torque. It system is a critical system, and there are indicators of an attacker gaining nexus gaining gaining access.
02:38
You may see insulation of back doors on a target system,
02:43
data death or confidential information exposed like a list of user log in credentials.
02:51
Any vulnerabilities needed to be remediated with the knobs
02:57
and last, Let's look at Level five urge.
03:00
In this level, an attacker is executing mo code and may have gained read right access to files own critical systems.
03:09
Vulnerabilities need to be remediated immediate.
03:15
Now let's look at vulnerability reporting.
03:17
It's important for our vulnerability. Imagine reports to be accurate and digestible for audience.
03:24
An easy way for us to get reporting is through the use of automated tools like open vials for vulnerability management.
03:32
And the supplemental resource is for this course I have linked to it have linked to a simple
03:38
to a sample Open vials report output
03:43
so you can get an idea would have made Little
03:49
says. Look at discovering vulnerability management on demand.
03:54
So how do we determine the best own demand? One. Ability management to to use
04:00
you two should include the following at the minimum.
04:04
So one identification of weakness.
04:08
The two news to be able to identify a boat, internal and external weaknesses.
04:14
Attack databases. The owned demand to should having a tax signature database, and it's constantly updated since new vulnerabilities or exposed deadly
04:27
credentials.
04:29
The two she require credentials for access integration with network appliances,
04:33
own demand to should integrate with existent network appliances like Simms
04:40
and Ideas I PS systems
04:44
dashboard.
04:46
The two should also have a dashboard that allows organization toe easily, identify roll devices on the network
04:54
trend analysis and that list of UN remediated run abilities with the highest level of severity
05:00
and lastly reports,
05:02
the two should also generate accurate reports.
05:09
Let's look at our post, says
05:11
Level 51 abilities that are found not need to be fixed. Urgent.
05:16
Is it true or is this folks?
05:21
This is false. Level five own abilities are considered urgent and should be corrected immediately.
05:34
Now let's look at our summer.
05:39
In this video, we talked about priority arising remediation of on abilities and vulnerability reports. In the next video, we're gonna talk about
05:47
the 10 best practices for vulnerability management.

Up Next

Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By

Instructor Profile Image
Corey Charles
Founder of DreamVision IT LLC
Instructor