Vulnerability Management
In this chapter, we will be reviewing everything you need to consider as part of your vulnerability management function. This function, to some extent, will be an extension of your cybersecurity operations, or SecOps, function. However, vulnerability management needs to be tracked separately because of the vast amount of effort needed to run this function efficiently. If you are managing vulnerabilities correctly, you will find this function to be very active, with your vulnerability analysts/administrators working constantly to remediate vulnerabilities. Like the cybersecurity operations function, you will need to ensure you have the dedication needed to run this function efficiently, along with ensuring you aren’t overworking those responsible for vulnerability management activities.
We will begin the chapter with an overview of managing your vulnerability management program. First, we will look at some building blocks needed to create your program...