Vulnerability Assessment Audit Checklist

Download as xls, pdf, or txt
Download as xls, pdf, or txt
You are on page 1of 2

Vulnerability Assessment Audit Checklist

No Requirement Status
1 Prioritize high-risk systems.
2 Prioritize high-risk vulnerability. The SANS Top 20 are, by consensus, the most
common and most often exploited vulnerabilities. They should be dealt with first.
3 Define roles and responsibilities with respect to vulnerability management, including
monitoring and identifying (for all of the software and hardware) the vulnerabilities
and release of patches, risk assessment, identifying the urgency with which the
patch needs to be deployed, carrying out the actual update (refer to control
A.12.5.1) and dealing with any coordination. There should be absolute clarity about
accountability, and individual responsibilities should be clearly written into job
descriptions.
4 Identify, for each of the software and other technology items, the relevant source of
information about vulnerability identification (possibly through Bugtraq or CVE) and
patch release (usually the vendor website, or through use of an appropriately
configured automatic update facility), and this information should be regularly
reviewed and, where necessary, updated.
5 Ensure that there are set steps, within a predetermined time line (such time line to
be developed in the light of a process-level risk assessment), for identifying the
risks of proceeding and of not proceeding with any given patch, for deciding what
steps should be taken and for implementing that decision – which should usually be
to install the patch unless there are good reasons not to.
6 Allow, under certain emergency circumstances, the patch to be installed following
the incident response process (see Chapter 25) rather than the change
management one; any such decision should be properly tracked and all the records
updated appropriately.
7 Ensure that, where necessary (the risk assessment process drives this), and prior
to implementation, patches are tested and evaluated to ensure that there are no
side effects on other systems.
8 Allow, in circumstances where a patch for an identified vulnerability is not yet
available or the side effects of implementing it are not acceptable, the organization
to adopt alternative controls, such as turning off services that are affected by it,
modifying firewalls or other access controls, increasing user awareness to detect
and respond to attacks or increased monitoring of activity to identify an attack on
the vulnerability.
9 Ensure that there is always an audit log of activity in relation to vulnerability
management.
10 Provide for regular monitoring and review of the vulnerability management process,
not just through the internal audit function to ensure that it is working acc ording to
specification but also by the information security adviser to ensure that the
specification remains adequate in the light of the organization’s evolving risk
assessment and risk treatment plan, in the changing security environment.
Notes

You might also like