From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Implement remediation and mitigation

Implement remediation and mitigation

From the course: Performing a Technical Security Audit and Assessment

Start my 1-month free trial

Implement remediation and mitigation

- In many cases when assessors deliver their final report to your organization their work is done. However, sometimes assessors are also involved in remediating the vulnerabilities they found. This makes sense because they are the most familiar with, not only the problems that exist, but how to fix them. If assessors will be helping with or leading remediation efforts, details of the support they'll provide should be captured in the assessment plan. The plan should also identify who from the organization will be assisting with the remediation efforts since assessors may not have the needed access or authority to implement changes on their own. Finally, the assessment plan should outline which action steps the remediation team should follow. Typically the remediation process will include four steps: test, coordinate, implement and validate, and report. Technical system changes can sometimes cause serious problems with the systems, such as instability or outages. That's why, before…

Contents