From the course: ISC2 Certified Secure Software Lifecycle Professional (CSSLP) (2023) Cert Prep

Unlock the full course today

Join today to access over 23,100 courses taught by industry experts.

Vulnerability management

Vulnerability management

- [Narrator] In order to detect and address potential weaknesses before an attacker can find them, you'll want to implement an effective vulnerability management process. You can get ahead of those attackers by learning how to scan, track, and triage vulnerabilities. Earlier in this course, when we discussed post-deployment security testing, we talked about vulnerability scanners. While vulnerability scanning is the foundation of vulnerability management, it's not the entire program. Scanning is an important step, but it's only the first one. Like many other aspects of your application security program, vulnerability management is cyclical. You start by scanning for potential weaknesses in every component of your application and app infrastructure. You then validate both the accuracy of the scan results and the severity of the detected vulnerabilities. Sometimes, scanners flag potential vulnerabilities for further investigation, and the severity that the scanner assigns to each…

Contents