Vulnerability Assessment (VA) is a systematic and ongoing practice of identifying and evaluating vulnerabilities (weaknesses) in information systems. The main goal is to determine the weak points within a technological infrastructure that could be exploited by malicious attackers to compromise security, cause damage, or gain unauthorized access to sensitive data.
How is the Vulnerability Assessment carried out?
1
Planning and information gathering - Define the scope of the analysis by identifying which systems and applications will be included, and gather information about the devices and software in use.
2
Vulnerability scanning - Use automated tools to perform scans on systems and applications, identifying known vulnerabilities and potential entry points.
3
Vulnerability analysis and classification - Analyze the scan results and classify the vulnerabilities based on their severity and risk to the organization, using standards like CVE to determine the priority of fixes.
4
Reporting and recommendations - Create a report documenting the identified vulnerabilities, providing recommendations to mitigate risks, and prioritizing corrective actions to be taken.
5
Corrections and remediation - Apply patches, updates, and configuration changes to fix vulnerabilities, protecting systems from the identified threats.
6
Continuous verification and monitoring - Verify the effectiveness of the corrections through a new scan, and implement continuous monitoring to detect new vulnerabilities and maintain high security over time.
In the context of a Vulnerability Assessment, the tests focus on identifying vulnerabilities within a system, network, or application. The main tests include: