From the course: CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities
Unlock the full course today
Join today to access over 22,600 courses taught by industry experts or purchase this course individually.
Correlating scan results
From the course: CompTIA Security+ (SY0-601) Cert Prep: 1 Threats, Attacks, and Vulnerabilities
Correlating scan results
- [Narrator] In addition to validating your scan results to eliminate false positive reports and remove documented exceptions, you'll also want to correlate scan reports with other information available to you from other sources. The first source of information that you should consult are any industry standards, best practices, or compliance obligations that are relevant to your organization. These standards may provide specific guidance on the types of vulnerabilities that require more urgent remediation. For example, PCI DSS contains some very specific guidance on vulnerability scanning. Here's a quote from the standard: "To demonstrate compliance, a scan must not contain high-level vulnerabilities in any component in the cardholder data environment. Generally, to be considered compliant, none of those components may contain any vulnerability that has been assigned a common vulnerability scoring system, or CVSS, base…
Contents
-
-
-
-
-
-
-
-
-
(Locked)
What is vulnerability management?5m 2s
-
(Locked)
Identify scan targets4m 24s
-
(Locked)
Scan configuration5m 20s
-
(Locked)
Scan perspective4m 24s
-
(Locked)
SCAP (Security Content Automation Protocol)2m 27s
-
(Locked)
CVSS (Common Vulnerability Scoring System)3m 31s
-
(Locked)
Analyzing scan reports4m 30s
-
(Locked)
Correlating scan results2m 20s
-
(Locked)
-
-