Sample Vulnerability Assessment and Management Policy:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
No edit summary
 
Line 18: Line 18:
Image:Vulnerability Assessment and Management Standard(4).png|Vulnerability Assessment and Management Standard page five of five
Image:Vulnerability Assessment and Management Standard(4).png|Vulnerability Assessment and Management Standard page five of five
</gallery>
</gallery>
[[File:Vulnerability Assessment and Management Standard.png]]
[[File:Vulnerability Assessment and Management Standard(1).png]]
[[File:Vulnerability Assessment and Management Standard(2).png]]
[[File:Vulnerability Assessment and Management Standard(3).png]]
[[File:Vulnerability Assessment and Management Standard(4).png]]

Latest revision as of 19:16, 14 January 2014

Sample Vulnerability Assessment and Management Standard

The Vulnerability Assessment and Management Standard define Company's objectives for establishing specific standards for the assessment and ongoing management of vulnerabilities.

Objectives

The Company will periodically assess and identify vulnerabilities in Company information systems environment and procedures. Specific instructions and requirements for assessing vulnerabilities are provided in the Sample Vulnerability Assessment Standard.

The findings from the vulnerability assessment activities must be used to develop a formal plan for the ongoing elimination or mitigation of the vulnerabilities. The Company must establish associated metrics for gauging the effectiveness of these plans. Specific instructions and requirements for managing vulnerabilities are provided in the Sample Vulnerability Management Standard.

Document Examples

Use these samples as a guide for your policy development. Fully customizable versions are available from The Policy Machine.