From the course: Implementing a Vulnerability Management Lifecycle

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

How to design effective mitigations

How to design effective mitigations

From the course: Implementing a Vulnerability Management Lifecycle

Start my 1-month free trial

How to design effective mitigations

- [Instructor] Now you're ready to design mitigations for the vulnerable systems. I say design because mitigations require planning and testing before being rolled out to your entire company. Usually, a vulnerability can be mitigated by installing a security update, which requires a software patch to be deployed. It's called a patch because it covers a hole or a flaw in the system. In fact, that's why the monthly security updates for Microsoft is called Patch Tuesday. But what if there is no patch for a vulnerability on your list? Well now you need to do some digging. To guide you, I've provided you with a mitigation plan template that you can download and use to document your work. I'll follow the template over the next few videos as we mitigate the tougher vulnerabilities. The first step in creating a patch-free mitigation plan is to understand the vulnerability being mitigated. If your scan report doesn't provide…

Contents