Free Privileged Account Discovery Tool: Identify & secure credentials to stop lateral movement. Download Free

BeyondTrust
  • Products
    Privileged Password Management
    Discover, manage, audit, and monitor privileged accounts
    Password Safe DevOps Secrets Safe
    Endpoint Privilege Management
    Manage privileges on Windows, Mac, Linux, and Unix endpoints
    Windows and Mac Unix and Linux Active Directory Bridge
    Secure Remote Access
    Centrally manage and secure remote access for service desks and vendors
    Remote Support Privileged Remote Access
    BeyondInsight Analytics
    See All Solutions
  • Resources

    Universal Privilege Management

    Our innovative Universal Privilege Management approach secures every user, asset, and session across your entire enterprise.

    Watch Video

    Learn

    Case Studies
    Competitor Comparisons
    Datasheets
    Glossary
    Product Demos
    Whitepapers

    Attend

    Events
    Go Beyond
    Training
    Webinars

    Support

    Changelog
    Professional Services
    Technical Documentation
  • Blog
  • Partners
  • Contact
  • Support
  • Services
  • Training
  • Events
  • Company

9 Keys to Getting the Most Out of Your Vulnerability Management Solution

April 16, 2019

  • Blog
  • Archive

First, it’s important to define our terms, as vulnerability management (VM) means a lot of different things to different people. With that in mind, I’ll define VM here as: the process to determine whether to eliminate, mitigate, or tolerate vulnerabilities based upon risk and the cost associated with fixing the vulnerabilities.

Two other relevant terms worth defining are:

  • Threat - person, circumstance, or event that has the potential to cause damage to an organizational asset or business function
  • Vulnerability - flaw in the design, implementation, or administration of a system that provides a mechanism for a threat to exploit the weakness of a system or process

With those terms now defined, here are 9 key areas that need to be in place to ensure your vulnerability management program is effective, and provides high-value to the organization:

  1. Identify all network assets
  2. Define asset criticality rankings (ACR)
  3. Determine exposures and vulnerabilities
  4. Track relevant threats
  5. Determine risk
  6. Take corrective actions
  7. Create metrics
  8. Identify and address compliance gaps
  9. Implement an automated vulnerability management system

The first task is arguably the most important. If you don’t know what your technology assets are, where they operate, and details about them, then you are simply powerless to fully protect them. As famed management consultant Peter Drucker astutely noted: you can't manage what you can't measure. From an information security perspective, you can’t secure what you don’t know about.

An organization must have a complete inventory and blueprint of their network. This is often accomplished via a network discovery process, with the output being a comprehensive inventory that details every server, workstation, network device, laptop, desktop and everything in between that is on the network. The ability to have a current, updated enterprise asset inventory is a critical aspect of a vulnerability management program.

The last thing any CIO, CTO, or CISO wants to do is play the IT equivalent of Where's Waldo? when trying to find a breached server that is leaking data. But that may be the situation they find themselves in if their resources are not well mapped, and they simply don’t know where the server physically resides, or what its IP address is.

Finally, just as a vulnerability management tool is important, don’t overlook the significance of making sure you have good, trained staff who know:

  • how to run the tool
  • how to make sense of the tool’s output
  • and how to apply that output to address the many vulnerabilities that the vulnerability scanner will find.

Vulnerability management should be a standard component of the information security management and regulatory framework within every organization. To learn how to get the most out of your vulnerability management solution, watch my on-demand webinar.

Related Resources

How to Use Vulnerability Assessment to Quantify & Reduce Cyber Risk (blog)

Vulnerability Scanning Explained (glossary)

Use Cases for Performing Vulnerability Assessments with Agent-Based Technology (blog)

Change the Game in Vulnerability Management (white paper)

Sample Vulnerability Management Policy (template)

Ben Rothke

Senior Security Consultant, Nettitude

Ben Rothke (@benrothke) is a senior security consultant with Nettitude and has over 15 years of industry experience in information systems security and privacy. His career incorporates a successful track record across corporate and consulting roles, securing IT assets for numerous Fortune 1000 companies.

He is the author of Computer Security - 20 Things Every Employee Should Know (McGraw-Hill) and a speaker at industry conferences, such as RSA and MISTI, and holds numerous industry certifications.

Stay Up To Date

Get the latest news, ideas, and tactics from BeyondTrust. You may unsubscribe at any time.

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

You May Also Be Interested In:

Webcasts | February 09, 2021

Customer Webinar: Remote Support 21.1 Released!

Webcasts | February 24, 2021

Your PAM 2021 Blueprint: Securing Privileged Accounts for On-Premises and Cloud Assets

Whitepapers

Evolving Privileged Identity Management (PIM) In The 'Next Normal'

BeyondTrust Logo
  • Facebook
  • Twitter
  • LinkedIn

Keep up with BeyondTrust

I agree to receive product related communications from BeyondTrust as detailed in the Privacy Policy, and I may manage my preferences or withdraw my consent at any time.

Customer Support
Contact Sales

Products

  • Endpoint Privilege Management
  • Password Management
  • Privileged Remote Access
  • DevOps Secrets Safe
  • Remote Support

Resources

  • Blog
  • Case Studies
  • Competitor Comparisons
  • Datasheets
  • Glossary
  • Videos
  • Webcasts
  • Whitepapers

About

  • Company
  • Careers
  • Contact
  • Events
  • Leadership Team
  • Partner Program
  • Press

Languages

  • English
  • German
  • French
  • Spanish
  • Korean
  • Portuguese
  • Japanese
  • Privacy
  • Security
  • Manage Cookies
  • WEEE Compliance

Copyright © 1999 — 2020 BeyondTrust Corporation. All rights reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust Corporation is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.