Vulnerability Management (VM)

Vulnerabilities are the hidden doors of the organisation which allows any unauthorized person (outsider/insider) to access the organisation’s network and business critical information. There are uncountable number of vulnerabilities and every year the list is growing rapidly. The process to identify, analyze, mitigate and notify these known vulnerabilities is termed as vulnerability management.

For effective and efficient management of these known vulnerabilities, organisations either needs to invest in purchasing an in-house vulnerability management tool and train resources for its usage or can simply outsource this service.

Vulnerabilities are constantly increasing, due to the growing number of cyberattacks. As per the CVE details, more than 12000 vulnerabilities have been reported in 2019. Organisations should be proactive in taking appropriate steps and ensuring that the IT ecosystem is free of vulnerabilities, as much as possible.

At BDO, we provide vulnerability management services as part of our managed security services to support the organisations in managing the known vulnerabilities, without spending much on setting up these resources internally. We have our in-house cybersecurity experts to entirely handle the organisation’s vulnerability management process. Our vulnerability management approach consists of the following steps:

 

  • Identification

Identify the organisation’s valuable digital assets.

  • Analysis

Scan the identified assets and analyse the associated risks.

  • Prioritization

Review the threat exposure and prioritize the risks.

  • Remediation

Apply patches or compensatory controls to mitigate the identified vulnerabilities.

  • Revalidation

Scan the digital assets again to identify whether the vulnerability is mitigated appropriately.

 

Shivendra Jha

Shivendra Jha

Partner - Head of Advisory Services and International Liaison Partner (ILP)
personView bio