Question from a rookie here:Is it wise to rely on a scanner to check critical 
points? If the scanner has its own set of priveleges, is it feasible that 
someone might use this as a means to attack the network?
Also, a suggestion for output: Each scan is logged in a spreadsheet with a date 
and time, and any issues raised. The spreadsheet is emailed internally to the 
operator, who can then review it.
Date: Mon, 17 Mar 2014 17:13:55 -0400
From: [email protected]
To: [email protected]
Subject: Re: [lopsa-discuss] Tracking CVEs / security updates

In the past (at companies under PCI compliance) we've had a vulnerability 
scanner that runs at intervals (monthly or quarterly) and tells you what needs 
to be patched (or covered with paperwork, ie "documentation of mitigating 
controls.") It is updated with the latest CVE entries on its own interval, 
presumably before scanning.

The scanner may dump its output into a ticket system, or not. Depends on how 
you want to track the work.

On Mon, Mar 17, 2014 at 2:23 PM, Phil Pennock <[email protected]> 
wrote:

What are people currently using for tracking status of security updates

of software which you depend upon in production?  This is separate from

"apply vendor security updates" as it pertains to the items which you

build from source or with custom packaging, because it's a core part of

the line of business, or for whatever other reason.



Just tickets in your regular ticketing system, perhaps in a special

queue?  Something else?  What sort of automation?



Eg, a vendor security notice (Ubuntu USN or whatever) comes in; does it

tie into existing tickets with CVEs already tracked and handled, or is

it a new issue?  Is it partly for something already dealt with, but

there's an extra CVE which was fixed and which needs a new rollout?

How do you track when you'll need customer/client notification, vs just

being able to hotfix?  How do you track release qualification status?



If you're using an existing ticketing system with some customisation,

are there any templates which you can share?



Thanks,

-Phil

_______________________________________________

Discuss mailing list

[email protected]

https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss

This list provided by the League of Professional System Administrators

 http://lopsa.org/




_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/                                        
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to