Tuesday, October 12, 2021

How Often Should You Perform Security Vulnerability Assessments

Vulnerability scans shall be conducted after any major system, organization, or infrastructure change to identify any security gaps. Also vulnerability assessments are required to be conducted as per the information security program/strategy of the organization. Required frequencies as of industry standards are listed below.

  • ISO 27001: Requires quarterly external and internal vulnerability scans
  • HIPAA: Requires a thorough risk assessment and vulnerability process, which can be identified with vulnerability scanning
  • PCI DSS: Requires quarterly external and internal scans conducted by an ASV (Approved Scanning Vendor)
  • FISMA: Requires documentation and implementation of a vulnerability program to protect the availability, confidentiality, and integrity of IT systems
  • NIST: Requires either quarterly or monthly vulnerability scans depending on the particular NIST framework (8001-171, 800-53, etc.)

Overall, an industry best practice is to perform vulnerability scanning at least once per quarter.

Related Posts:

  • Installing NFS Services on Ubuntu 12.10The services required to enable NFS folder sharing are not installed by default on Ubuntu. They can easily be installed, however, by opening a termina… Read More
  • IP Tables with Ubuntu Iptables is a firewall, installed by default on all official Ubuntu distributions (Ubuntu, Kubuntu, Xubuntu). Default Configurations When you insta… Read More
  • Enforce password historyThis policy enables administrators to enhance security by ensuring that old passwords are not reused continually. Here administrators can configure th… Read More
  • Usefull SVN Commands $svn help  Provides a summary of the available commands. Available subcommands:     add   blame (praise, annotate, ann)… Read More
  • How to enable .htaccessIn general, you should never use .htaccess files unless you don't have access to the main server configuration file. .htaccess files should be used in… Read More

0 comments: