Get 2 Documentation Toolkits for the price of 1
Limited-time offer – ends March 28, 2024

Expert Advice Community

Guest

Configuration and Vulnerability Management

  Quote
Guest
Guest user Created:   Jan 21, 2021 Last commented:   Jan 21, 2021

Configuration and Vulnerability Management

I would like you to show me how configuration and vulnerability management are connected / dependent on each other. and How Configuration management can help in vulnerability management in achieving goals. Would appreciate early response. Thank you.

0 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Rhand Leal Jan 21, 2021

Configuration management is related to you know which assets you have and how they are configured, while vulnerability management is related to the identification and handling of misconfigurations and threats that can exploit current configurations.

Both configuration and vulnerability management are connected by the fact that by means of configuration management you can:

  • identify the impact of identified vulnerabilities (e.g., how many devices are vulnerable, which sets of configurations should be analyzed/changed.
  • prioritize which vulnerabilities to look for first (they would be related to the most critical configurations you have)

This article will provide you a further explanation about vulnerability management:

These materials will also help you regarding vulnerability management:

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Jan 21, 2021

Jan 21, 2021

Suggested Topics

Guest user Created:   Feb 07, 2023 ISO 27001 & 22301
Replies: 1
0 0

Supplier questionnaire

Guest user Created:   Oct 21, 2022 ISO 27001 & 22301
Replies: 1
0 1

New control names