From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Implement remediation and mitigation
From the course: Performing a Technical Security Audit and Assessment
Implement remediation and mitigation
- In many cases when assessors deliver their final report to your organization their work is done. However, sometimes assessors are also involved in remediating the vulnerabilities they found. This makes sense because they are the most familiar with, not only the problems that exist, but how to fix them. If assessors will be helping with or leading remediation efforts, details of the support they'll provide should be captured in the assessment plan. The plan should also identify who from the organization will be assisting with the remediation efforts since assessors may not have the needed access or authority to implement changes on their own. Finally, the assessment plan should outline which action steps the remediation team should follow. Typically the remediation process will include four steps: test, coordinate, implement and validate, and report. Technical system changes can sometimes cause serious problems with the systems, such as instability or outages. That's why, before…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.