Week 2 Posting – Handling SLAs, CVSS, and Vulnerability Scanning

Thoughts on Week 2: Handling SLAs, CVSS, and Vulnerability Scanning In Week 2 of this class, I learned the basics of vulnerability management and how formal agreements and frameworks help keep things running smoothly. We began by talking about Service Level Agreements (SLAs). These are more than just contracts; they tell you what to expect when you work with third-party providers in terms of uptime, incident response times, and security responsibilities. I learned that SLAs are a good way to hold both organizations and vendors accountable, especially when they are handling sensitive data. I also learned how to use vulnerability assessment tools and what to do after I pick them. You can't just pick a tool; you also need to set the exact limits of your scans, make rules, make a schedule for scans, and decide if authenticated scans are needed. I learned that pilot scans are important to reduce false positives and that the results of scans should be linked to a ticketing system or configuration management database. This integration changes raw data into tasks that can be followed through to completion. We also looked into the Common Vulnerability Scoring System (CVSS). This framework gives vulnerabilities a score based on how easy they are to exploit and how bad they could be, using base, temporal, and environmental metrics. I learned how companies choose which vulnerabilities to fix first by learning about CVSS. A problem with a high score on a critical server needs to be fixed right away, but a problem with a lower score on an internal system can wait until later to be fixed. Finally, I learned about vulnerability feeds, which are curated sources of information that always give you the most up-to-date information on new threats, CVE IDs, CVSS scores, and how to fix them. Teams can stay ahead of problems by staying subscribed to a reliable feed instead of waiting for them to happen. This makes sure that new risks are handled right away. In general, Week 2 made it clear how formal agreements, structured assessment practices, and standardized scoring systems all work together to make a good process for managing vulnerabilities. When I work with vendors or team members, I feel like I can better figure out which security issues are the most important and make my expectations clear.

Comments

Popular posts from this blog

Week 1 Posting -

Week 8 Blog: Ideas and Tools for Automating

Week 5 Blog — Software and Hardware Assurance Best Practices