Vulnerability Management Program Development

Manage network vulnerabilities

Next Steps:

Overview

Do the same vulnerabilities keep cropping up on your network year after year? If so, you are a perfect candidate for the Foundstone Vulnerability Management Program Development service. Network vulnerability management is a never-ending process, and Foundstone will help you develop a network vulnerability management lifecycle to ensure new security weaknesses are quickly discovered and mitigated.

Key Benefits

Foundstone builds network vulnerability management programs that:

  • Establish essential security controls
  • Identify and eliminate causes of vulnerabilities
  • Continuously monitor and detect internal and external vulnerabilities
  • Provide you with a documented process for the remediation of identified vulnerabilities
  • Establish a vulnerability management policy for your organization
  • Help identify vulnerability owners and track the remediation status of the vulnerabilities

Methodology

Successful network vulnerability management balances the demands of security against the demands of individual business units. It includes these 11 steps:

  1. Current policy review relative to generally recognized standards and compliance guidelines
  2. Asset inventory:
    • By type
    • By owner
    • Specifications
  3. Data classification to create an asset criticality profile, which defines how important each asset is to your organization
  4. Vulnerability assessment
    • What and when
    • Vulnerability classification
  5. Threat correlation
    • Worms, exploits, wide-scale attacks, new vulnerabilities
    • Correlation of high-profile threats with the most important assets
  6. Determination of risk level based on the intersection of assets, vulnerabilities, and threats so you can put your focus and attention on truly critical risks
  7. Remediation
    • Factoring the cost to remediate versus the cost to ignore
    • Zeroing in on must-have remediations
  8. Metrics
    • Accurate metrics for more informed and more effective management
    • Evaluation of your current state of security measurements against current baselines and ideal conditions (e.g., Six Sigma)
  9. Training
  10. Communication
  11. Definition of organizational roles and responsibilities

Foundstone first assesses your current network vulnerability management program in the 11 best-practice areas. Based upon the gaps identified in your existing program, Foundstone builds a more comprehensive vulnerability management program that addresses areas of concern. Our deliverables include:

  • Strategic Security Road Map document
  • Strategic Security Road Map project plan
  • Strategic Security Road Map one-day workshop with presentation