top of page
Micro Nova Security logo

+44 7701 064 020

cyber-security-eye.jpg
VULNERABILITY MANAGEMENT The First Step Towards Cyber Maturity is Knowing Your Assets, Applications and Security Posture.

The exploitation of known vulnerabilities in software remains the greatest cause of security incidents. Patching, the process of applying updates from software developers, hardware suppliers and vendors, to either enhance functionality or to improve security is one of the most important things you can do to mitigate vulnerabilities.

The NCSC (National Cyber Security Centre) recommends that organisations perform vulnerability assessment of their entire estate on a monthly basis. New vulnerabilities are reported all the time and many software vendors release updates on a monthly cycle (such as Microsoft's monthly 'Patch Tuesday').

However, rather than just randomly patching things it is advisable to put some method to the madness. The industry talks about the VULNERABILITY MANAGEMENT LYFE CYCLE.

This is a methodological way to help you know all your assets (including non-corporate assets like guest or rogue assets connected to your network). It helps you prioritize your assets ensuring business-critical assets are easily identified and protected. It helps you put in place a regular patching regime ensuring critical patches are applied as soon as possible..

The first step towards cyber maturity is knowing your assets, applications and security posture.

VULNERABILITY

MANAGEMENT

The First Step Towards Cyber Maturity is Knowing Your Assets, Applications and Security Posture

VULNERABILITY

MANAGEMENT

The First Step Towards Cyber Maturity is Knowing Your Assets, Applications and Security Posture

The first step towards cyber maturity is knowing your assets, applications and security posture.

DEVICE SECURITY

Placeholder for Subtitle

The steps in the Vulnerability Management Life Cycle are described below.

Discover: Inventory all assets across the network and identify host details including the operating system and open services to identify vulnerabilities. Develop a network baseline. Identify security vulnerabilities on a regular automated schedule.

Prioritize Assets: Categorize assets into groups or business units and assign a business value to asset groups based on their criticality to your business operation.

Assess: Determine a baseline risk profile so you can eliminate risks based on asset criticality, vulnerability threat, and asset classification.

Report: Measure the level of business risk associated with your assets according to your security policies. Document a security plan, monitor suspicious activity and describe known vulnerabilities.

Remediate: Prioritize and fix vulnerabilities in order according to business risk. Establish controls and demonstrate progress.

Verify: Verify that threats have been eliminated through follow-up audits.

At Micro Nova we want our clients to build resilience into the ways of working so vulnerability management might be a subset of your overall Risk Management. Perhaps you are already using or are about to use risk management  frameworks like NIST 800-53. Our Virtual Information Security manager is the right resource to help in this line of work.

The exploitation of known vulnerabilities in software remains the greatest cause of security incidents. Patching, the process of applying updates from software developers, hardware suppliers and vendors, to either enhance functionality or to improve security is one of the most important things you can do to mitigate vulnerabilities.

The NCSC (National Cyber Security Centre) recommends that organisations perform vulnerability assessment of their entire estate on a monthly basis. New vulnerabilities are reported all the time and many software vendors release updates on a monthly cycle (such as Microsoft's monthly 'Patch Tuesday').

However, rather than just randomly patching things it is advisable to put some method to the madness. The industry talks about the VULNERABILITY MANAGEMENT LYFE CYCLE.

This is a methodological way to help you know all your assets (including non-corporate assets like guest or rogue assets connected to your network). It helps you prioritize your assets ensuring business-critical assets are easily identified and protected. It helps you put in place a regular patching regime ensuring critical patches are applied as soon as possible..

The steps in the Vulnerability Management Life Cycle are described below.

Discover: Inventory all assets across the network and identify host details including the operating system and open services to identify vulnerabilities. Develop a network baseline. Identify security vulnerabilities on a regular automated schedule.

Prioritize Assets: Categorize assets into groups or business units and assign a business value to asset groups based on their criticality to your business operation.

Assess: Determine a baseline risk profile so you can eliminate risks based on asset criticality, vulnerability threat, and asset classification.

Report: Measure the level of business risk associated with your assets according to your security policies. Document a security plan, monitor suspicious activity and describe known vulnerabilities.

Remediate: Prioritize and fix vulnerabilities in order according to business risk. Establish controls and demonstrate progress.

Verify: Verify that threats have been eliminated through follow-up audits.

At Micro Nova we want our clients to build resilience into the ways of working so vulnerability management might be a subset of your overall Risk Management. Perhaps you are already using or are about to use risk management  frameworks like NIST 800-53. Our Virtual Information Security manager is the right resource to help in this line of work.

The first step towards cyber maturity is knowing your assets, applications and security posture.

VULNERABILITY MANAGEMENT - The First Step Towards Cyber Maturity is Knowing Your Assets, Applications and Security Posture

VULNERABILITY

MANAGEMENT

The First Step Towards Cyber Maturity is Knowing Your Assets, Applications and Security Posture

cyber-sec-background-2.jpg

Data Security

Cloud Security

Cyber Essentials

Device Security

WE CAN ALSO HELP WITH:

What Is Vulnerability Management?

The vulnerability management lifecycle involves more than just scanning assets. It involves multiple activities including inventory, information management, risk management, assessments etc. This video tutorial from concepts Work goes into a good level of detail on conducting proper vulnerability management.

VULNERABILITY MANAGEMENT The First Step Towards Cyber Maturity is Knowing Your Assets, Applications and Security Posture.
bottom of page