In Cybersecurity, Vulnerability Management
terms-1

­­­­­­­­­­­Vulnerability Management

When talking about cybersecurity, terms can sometimes be hard to understand. Vulnerability Management, pen testing, and least privilege access are some examples of cybersecurity terms you may have heard or read about.  In this blog series, we will define these terms and what they mean for your organization. The first edition of our blog series, Accellis Technology Group Director of Cybersecurity, Tom Fazio, has defined Vulnerability Management.

Vulnerability Management is a crucial piece of your security program in maintaining a secure environment. A vulnerability sometimes referred to as a security hole, is a weakness in software, hardware, configuration, or a process that a bad actor can exploit to gain unauthorized access to an asset for theft or a malicious purpose.

The common components of vulnerability management include detection, assessment, and remediation. First, a vulnerability scan is run to search and examine network assets such as computers, firewalls, and software. The scanner utilizes a database containing a number of known security holes which then systematically checks the scanned assets against.  The scans are very thorough, scanning each service and port of the asset to detect anomalies in packet construction, and potential paths to exploitable programs or scripts.


Once the scanner builds a list of detected vulnerabilities, a cybersecurity engineer plans out a course of remediation. Remediation could be as simple as a vendor patch or it may require reconfiguring the device according to an updated best practice. In some cases, remediation cannot be completed due to a business need or a nonexistent patch and we call those exceptions. If an exception is identified, we may put in a risk mitigator such as an additional firewall layer or have a plan for decommissioning.

Pen tests (penetration testing), which we will define in part 2 of this blog series, can be automated or performed manually, involve gathering information about the target before the test, identifying possible entry points, attempting to breach the system and reporting findings. We will discuss pen tests in our next blog article.

Read Part 2 of our Cybersecurity Terms & Definitions blog series: Pen Test (Penetration Test)

Have Questions?

Do you have questions about cybersecurity and how to protect your organization?  Fill out the form below and Cybersecurity expert will reach out at your earliest convenience to answer your questions.

Leave a Comment

Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.