4.1 Vulnerability Management on Demand - VM

Video Activity
Start your free 3-day trial and become one of the 3 million Cybersecurity professionals advancing their career goals
Sign up with
OR

Already have an account? Sign In »

Time
1 hour 23 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:02
In the last video, we talked about the use of consultants and automation of vulnerability management.
00:07
We also discussed somewhat common tools and used for vulnerability. Manager.
00:11
In this video, we're going to talk about priority arising. Remediation of on abilities
00:18
following objectives We're gonna talk about priority arising. Remediation
00:22
and the vulnerability reporting.
00:26
Let's look at our pre assessment.
00:28
What does vulnerability management identify?
00:31
Is it a
00:33
perimeter and internal weaknesses? Be only perimeter weaknesses or a seat only internal weaknesses?
00:43
The correct answer here is a
00:46
vulnerability. Imagine that helps you identify weaknesses on boat to perimeter and internal network.
00:55
So it's like a prior to rise and remediation. So we're gonna cover level one, which is minimal.
01:00
Level two, which is medium
01:00
level three, which is serious. Level four, which is critical and level firewood. Just urgent.
01:07
So let's jump right on it.
01:08
So first we're gonna go head to cover Level one, which is minimal
01:11
in this level of vulnerability scanning. Some information can be collected from a target system,
01:18
but it's not a critical system, and information obtained has little value.
01:23
We still need to perform remediation of these one abilities, but they are not critical tow business operations.
01:30
Now let's look at Level two medium
01:34
and this level the target system, maybe a critical system,
01:38
but they're for made obtain. Its Onley moderately helpful,
01:42
such as a version of sulfur applications or the operating system and use.
01:49
And Yvonne ability discovered needs to be re mediated. But there is likely not an urgency for the organization to do so.
01:59
Now let's look at Level three, Siri's.
02:02
In this level, the target system is likely critical system.
02:07
There are indicators of a threat. Actor.
02:09
This could include things like directory browsing,
02:13
the reading of files and in dollars service or distributed denial of service attacks.
02:19
Any vulnerabilities discovered needed to be remediated. Quick.
02:23
Let's look at Level four
02:27
and level forward torque. It system is a critical system, and there are indicators of an attacker gaining nexus gaining gaining access.
02:38
You may see insulation of back doors on a target system,
02:43
data death or confidential information exposed like a list of user log in credentials.
02:51
Any vulnerabilities needed to be remediated with the knobs
02:57
and last, Let's look at Level five urge.
03:00
In this level, an attacker is executing mo code and may have gained read right access to files own critical systems.
03:09
Vulnerabilities need to be remediated immediate.
03:15
Now let's look at vulnerability reporting.
03:17
It's important for our vulnerability. Imagine reports to be accurate and digestible for audience.
03:24
An easy way for us to get reporting is through the use of automated tools like open vials for vulnerability management.
03:32
And the supplemental resource is for this course I have linked to it have linked to a simple
03:38
to a sample Open vials report output
03:43
so you can get an idea would have made Little
03:49
says. Look at discovering vulnerability management on demand.
03:54
So how do we determine the best own demand? One. Ability management to to use
04:00
you two should include the following at the minimum.
04:04
So one identification of weakness.
04:08
The two news to be able to identify a boat, internal and external weaknesses.
04:14
Attack databases. The owned demand to should having a tax signature database, and it's constantly updated since new vulnerabilities or exposed deadly
04:27
credentials.
04:29
The two she require credentials for access integration with network appliances,
04:33
own demand to should integrate with existent network appliances like Simms
04:40
and Ideas I PS systems
04:44
dashboard.
04:46
The two should also have a dashboard that allows organization toe easily, identify roll devices on the network
04:54
trend analysis and that list of UN remediated run abilities with the highest level of severity
05:00
and lastly reports,
05:02
the two should also generate accurate reports.
05:09
Let's look at our post, says
05:11
Level 51 abilities that are found not need to be fixed. Urgent.
05:16
Is it true or is this folks?
05:21
This is false. Level five own abilities are considered urgent and should be corrected immediately.
05:34
Now let's look at our summer.
05:39
In this video, we talked about priority arising remediation of on abilities and vulnerability reports. In the next video, we're gonna talk about
05:47
the 10 best practices for vulnerability management.
Up Next
Fundamentals of Vulnerability Management

Most of the successful attacks through a business network could be prevented with vulnerability management. This course focuses on what you can do to automatically manage vulnerabilities and keep your network safe from attack.

Instructed By