Security Vulnerability Response Best Practices
The number of security vulnerabilities identified in servers, operations systems, applications, and databases has increased at an alarming rate in the past several years—and the outlook going forward is no better. Systems, networks, and applications will continue to be susceptible to security vulnerabilities, so it is important to be prepared with a response when a vulnerability is identified. Ensuring you are on top of vulnerability management is key here.
Alert Logic is not immune to vulnerabilities, and in the fall of 2014 our teams responded to three major security vulnerabilities (heartbleed, shellshock, and POODLE) and a number of minor ones. These instances enabled us to further develop our response plan, which outlines an approach that can be used as a template for defining any organization’s action plan when faced with vulnerability.
Throughout this paper, we will discuss Alert Logic’s step-by-step approach to responding to a vulnerability, using the company’s response to the shellshock vulnerability as our case study.
Download the Security Vulnerability Response Best Practices Today
We've emailed you the download link to the email address you have provided. You can also download the asset below.