Vulnerability Management & Assessment in the Microsoft Security Stack (2022)
TL;DR: Check out the Summary section.
There is no joy without some accompanying disgrace, I remember that lesson from college days, a professor would tell us that while laughing at the poor kids whose dreams she was about to crush…
It’s a lesson imbued into my soul, so much so that I can relate when looking at how much resource is invested after a new technology is deployed into managing risks associated with it (be that its setup, an expansion in requirements, or just software update).
When managing an enterprise infrastructure, managing vulnerabilities is among the many risk reduction tasks and responsibilities. Every piece of software is bound to being vulnerable to exploits — all the updates we get to see every day tell us more about this fact. This is the origin story of why to “Manage” vulnerabilities.
And for people working with cyber, when there’s a challenge, there are processes and tech to back them up. This is a look at Processes and Tech that can help the People in Cybersecurity.
./vulnerabilityManagement
There are fundamental considerations to Vulnerability Management (VM), it goes beyond scanning, it is supposed to provide complete ability to understand where…