Requirement:
The cybersecurity requirements for technical vulnerabilities management must be implemented.
Control Implementation Guidelines:
- Implement all cybersecurity requirements to the organization's approved vulnerabilities management. It is also recommended that the vulnerabilities management procedures cover the following, but not limited to:
- Periodic vulnerability assessment and detection procedures
- The mechanism for classifying vulnerabilities according to their severity
- Procedures for addressing vulnerabilities based on their classification and associated cyber risks
- Mechanism and procedure for escalation of technical vulnerabilities
- Methods of linking vulnerabilities management procedures to the security patch management procedures
Relevant Cybersecurity Tools:
- Vulnerability Management Process Template
- Vulnerability Management Log Template
Expected Deliverables:
- Vulnerability Management Procedure
- Patch Management Procedures
- Vulnerabilities detection and testing reports (pre- and post-treatment) indicating classification of vulnerabilities
Quick & Simple
Discover Our Cybersecurity Compliance Solutions:
Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you