Managing Your Vulnerability Program
First, let’s take a high-level look at all the sub-functions that should be addressed as part of vulnerability management. The following image captures much of what the vulnerability management function entails.
Figure 8.1: Sub-functions of the vulnerability management function
As a reminder, vulnerability management is the process of identifying and remediating vulnerabilities – more specifically, identifying and remediating vulnerabilities as they relate to and impact your organization. The following image provides a more detailed visual of the steps involved in vulnerability management.
Figure 8.2: The vulnerability management lifecycle
Vulnerability management is yet another function within the cybersecurity program that requires never-ending commitment, unfortunately. This chapter comes right after the cybersecurity operations chapter for a reason. In some respects, your vulnerability management activities...