From the course: Implementing a Vulnerability Management Lifecycle

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Step 3 case study

Step 3 case study

From the course: Implementing a Vulnerability Management Lifecycle

Start my 1-month free trial

Step 3 case study

- [Instructor] Let's check back in with our case study team, and see how they did mitigating some of the vulnerabilities they found. You may remember that their first routine scan report showed over 2,500 vulnerabilities across dozens of hosts, and that they calculated they needed 232 labor hours just to clear the backlog of the 1,389 severity three, four, and five vulnerabilities on their list. Eventually, they figured out that there were security patches available for over 90% of the vulnerabilities. Of the rest, there were three typical situations that they had to face. The first type was the same as the severe Dropbear SSH vulnerability that we looked at in a previous video. As I mentioned back then, the scan report did not show there was a patch available, so the team looked up the CVE and found more details. A link in the CVE record showed an article that explained the Dropbear packages simply needed to be…

Contents