What is Vulnerability Assessment? A Step by Step Guide
16/06/2012 Article
Vulnerability Assessment is when you take the known systems. Such as version status, configuration information and the activities performance within an organisation and then check these for known vulnerabilities.
Vulnerability Assessments are different from penetration tests by the virtue that they are completed using predefined tools. Also, a vulnerability assessment is a set methodology that is limited to pre-existing knowledge about those systems. It is important to have knowledge of how the systems interact with one another. Understanding how the system interacts you comprehend better the discount false-positives and understand the real risks involved. The example provided by (ISC)2 is where an anonymous FTP server is likely to get flagged up as a vulnerability. The fact of the matter may well be that it is part and parcel of the design of the system to have anonymous FTP capabilities.
Using automated tools such as Nessus is common, though we need to consider a preliminary step to have any credibility. All the tools must be up to date as they are based on the use of known vulnerability databases etc.
Once we identify the unprotected vulnerabilities we categorise them on a criticality scale such as 1 – 5 (high to low). This way the vulnerabilities can be dealt with in an appropriate order and appropriate speed.
Finally, we produce a remediation plan by advising the system/information owners and discussing the implications. It is of vital importance that everybody agrees with this plan. Also, all parties need to adhere to the time scales.
YGHT provides Pen Test services