Cyber Security: Vulnerability management

Status: Live
Published: 11/05/2021
Security level: Official
Amended / Internally developed: False
Live on platform: 23/09/2021
Target Audience: Technical / General
Authoring body: National Cyber Security Centre (NCSC)
Grading: no grading applied
Guidance
Abstract

Step 5 from the 10 steps to Cyber Security covers how to keep your systems protected throughout their lifecycle.

The majority of cyber security incidents are the result of attackers exploiting publicly disclosed vulnerabilities to gain access to systems and networks. Attackers will, often indiscriminately, seek to exploit vulnerabilities as soon as they have been disclosed. So it is important (and essential for any systems that are exploitable from the internet) to install security updates as soon as possible to protect your organisation. Some vulnerabilities may be harder to fix, and a good vulnerability management process will help you understand which ones are most serious and need addressing first.

Download attachments: 

  Vulnerability management.pdf

Category: Devices Security Cloud