Saturday, December 24, 2022

Vulnerability Scanning vs Vulnerability Management vs Vulnerability Assessment vs Penetration Testing

Typical vulnerability lifecycle has the following steps:

  1. Discover
  2. Prioritize Assets
  3. Assess
  4. Report
  5. Remediate
  6. Verify


Vulnerability Scanning -> Discover + Scan + Report


Vulnerability Assessment -> Discover + Scan + Prioritize (Asset + Vulnerability) + Report


Penetration Testing -> Discover + Scan + Exploit + Report


Vulnerability Management -> Discover + Scan + Prioritize (Asset + Vulnerability) + Report + Remediate + Verify


Although PT lifecycle is different from VM lifecycle, the steps mentioned in PT are for comparison purpose only. Also as a VM analyst, one has to manage exceptions and analyze false positives which I think can be considered a part of "Remediate" step.


Happy Learning !!

No comments:

Post a Comment

Vulnerability Management - Understanding vulnerability posture

Understanding the vulnerability posture of an organisation at a basic level helps you drive remediation efforts. So, I don't know what t...