课程: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

免费学习该课程!

今天就开通帐号,24,600 门业界名师课程任您挑!

Correlating scan results

Correlating scan results

- [Narrator] In addition to validating your scan results to eliminate false positive reports and remove documented exceptions, you'll also want to correlate scan reports with other information available to you from other sources. The first source of information that you should consult are any industry standards, best practices, or compliance obligations that are relevant to your organization. These standards may provide specific guidance on the types of vulnerabilities that require more urgent remediation. For example, PCI DSS contains some very specific guidance on vulnerability scanning. Here's a quote from the standard. To demonstrate compliance, a scan must not contain high level vulnerabilities in any component in the cardholder data environment. Generally to be considered compliant, none of those components may contain any vulnerability that has been assigned a common vulnerability scoring system or CVSS base score equal to or higher than 4.0. That's very explicit guidance that…

内容