Design and Implement a Vulnerability Management Program – Phase 2: Triage Vulnerabilities and Assign Urgencies

Author(s): Filipe De Souza, Wesley McPherson

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

This phase will allow you to take your vulnerabilities and begin to evaluate them. It includes triaging your vulnerabilities, as well as determining the risk they pose based on their intrinsic qualities and how they affect sensitive data or business-critical operations. This phase will take you through the following activities:

  • Triage vulnerabilities.
  • Evaluate identified vulnerabilities based on intrinsic qualities.
  • Determine high-level business criticalities.
  • Determine high-level data classifications.
  • Assign urgencies to vulnerabilities based on the classifications.

Use this phase as part of the full blueprint, Design and Implement a Vulnerability Management Program.

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019