5 Vulnerability Assessment Common Misperceptions

In response to the ever-growing list of breaches that have come to light in recent years, organizations across industries are taking a more serious approach to the need to perform a thorough vulnerability assessment.

A vulnerability assessment is a process of defining, identifying, classifying, and prioritizing vulnerabilities in your organization’s applications, systems, and network for the purpose of understanding the risks and formulating a strategy to improve security.

At the core of vulnerability assessment is a reliance on automated testing tools that seek out known and potential vulnerabilities, bringing them to the attention of security professionals and developers who can investigate and remediate when needed.   

3 Types of Vulnerability Assessments

As noted above, a vulnerability assessment should be carried out for all the elements of an organization’s infrastructure and assets. Attackers know that they have multiple routes of entry into an organization, so it is important to take a comprehensive approach that denies them access across the board.

Testing should cover assets such as:

#1 Applications – Whether front facing or on the back end, applications are the gateway to your organization’s data. Technologies for testing your proprietary code include Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Interactive Application Security Testing (IAST), and Runtime Application Self Protection (RASP), while Software Composition Analysis (SCA) detects open source components with known vulnerabilities.

#2 Databases – How we store our data matters. Is it configured correctly to keep prying eyes out? Mistakes in your AWS S3 or MongoDB configs can leave your precious info exposed, so you had better be sure that you are tracking all of your databases and confirming that they are being secured.

#3 Network – Reports of the demise of the perimeter have been greatly (Read more…)

*** This is a Security Bloggers Network syndicated blog from Blog – WhiteSource authored by Gabriel Avner. Read the original post at: https://resources.whitesourcesoftware.com/blog-whitesource/vulnerability-assessment