Vulnerability management is a strategy that you can use in your organization’s system to detect, minimize, and respond to incidents by taking the offensive perspective against a real skilled attacker.
Vulnerability management processes use vulnerability scanners, vulnerability databases, manual or automated vulnerability testing, and a variety of other tools to ensure that all threats are accounted for.
- Vulnerabilities in code, such as SQL injection or cross-site-scripting (XSS) opportunities
- Insufficient authentication and authorization mechanisms
- Insecure or misconfigured settings, such as weak access controls or passwords