Sample Vulnerability Assessment and Management Policy:: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
== | ==Sample Vulnerability Assessment and Management Standard== | ||
The Vulnerability Assessment and Management Standard define Company's objectives for establishing specific standards for the assessment and ongoing management of vulnerabilities. | |||
==Objectives== | |||
== | |||
The Company will periodically assess and identify vulnerabilities in Company information systems environment and procedures. Specific instructions and requirements for assessing vulnerabilities are provided in the [[Sample Vulnerability Assessment Standard:|'''Sample Vulnerability Assessment Standard''']].<br> | The Company will periodically assess and identify vulnerabilities in Company information systems environment and procedures. Specific instructions and requirements for assessing vulnerabilities are provided in the [[Sample Vulnerability Assessment Standard:|'''Sample Vulnerability Assessment Standard''']].<br> | ||
<br> | <br> | ||
The findings from the vulnerability assessment activities must be used to develop a formal plan for the ongoing elimination or mitigation of the vulnerabilities. The Company must establish associated metrics for gauging the effectiveness of these plans. Specific instructions and requirements for managing vulnerabilities are provided in the [[Sample Vulnerability Management Standard:|'''Sample Vulnerability Management Standard''']].<br> | The findings from the vulnerability assessment activities must be used to develop a formal plan for the ongoing elimination or mitigation of the vulnerabilities. The Company must establish associated metrics for gauging the effectiveness of these plans. Specific instructions and requirements for managing vulnerabilities are provided in the [[Sample Vulnerability Management Standard:|'''Sample Vulnerability Management Standard''']].<br> | ||
<br> | <br> | ||
== | ==Document Examples== | ||
Use these samples as a guide for your policy development. Fully customizable versions are available from [http://policy-machine.com The Policy Machine].<br> | |||
The | |||
<br> | <br> | ||
<gallery> | |||
Image:Vulnerability Assessment and Management Standard.png|Vulnerability Assessment and Management Standard page one of five. | |||
Image:Vulnerability Assessment and Management Standard(1).png|Vulnerability Assessment and Management Standard page two of five. | |||
Image:Vulnerability Assessment and Management Standard(2).png|Vulnerability Assessment and Management Standard page three of five. | |||
Image:Vulnerability Assessment and Management Standard(3).png|Vulnerability Assessment and Management Standard page four of five. | |||
Image:Vulnerability Assessment and Management Standard(4).png|Vulnerability Assessment and Management Standard page five of five | |||
</gallery> | |||
[[File:Vulnerability Assessment and Management Standard.png]] | |||
[[File:Vulnerability Assessment and Management Standard(1).png]] | |||
[[File:Vulnerability Assessment and Management Standard(2).png]] | |||
[[File:Vulnerability Assessment and Management Standard(3).png]] | |||
[[File:Vulnerability Assessment and Management Standard(4).png]] |
Revision as of 19:13, 14 January 2014
Sample Vulnerability Assessment and Management Standard
The Vulnerability Assessment and Management Standard define Company's objectives for establishing specific standards for the assessment and ongoing management of vulnerabilities.
Objectives
The Company will periodically assess and identify vulnerabilities in Company information systems environment and procedures. Specific instructions and requirements for assessing vulnerabilities are provided in the Sample Vulnerability Assessment Standard.
The findings from the vulnerability assessment activities must be used to develop a formal plan for the ongoing elimination or mitigation of the vulnerabilities. The Company must establish associated metrics for gauging the effectiveness of these plans. Specific instructions and requirements for managing vulnerabilities are provided in the Sample Vulnerability Management Standard.
Document Examples
Use these samples as a guide for your policy development. Fully customizable versions are available from The Policy Machine.
-
Vulnerability Assessment and Management Standard page one of five.
-
Vulnerability Assessment and Management Standard page two of five.
-
Vulnerability Assessment and Management Standard page three of five.
-
Vulnerability Assessment and Management Standard page four of five.
-
Vulnerability Assessment and Management Standard page five of five