Link Search Menu Expand Document

Vulnerability Scans

Table of contents

Introduction

Vulnerability scanning is the process of identifying security weaknesses and flaws in systems and software running on them. This is an integral component of a vulnerability management program, which has one overarching goal – to protect the organization from breaches and the exposure of sensitive data. These programs rely on assessment to gauge security readiness and minimize risk, and vulnerability scanning is a critical tool in the cybersecurity toolbox.

With the cloud ara and fast changing IT environments, it is important to periodically check for vulnerabilities. Wortell Vulnerability Scans are vulnerability scans as a service, meaning that vulnerability scanning is an ongoing activity. This allows for detecting vulnerabilities that are introduced due to not patching software/infrastructure but also vulnerabilities that are introduced due to changes on infrastructure and software.

SKU’s

Feature Vulnerability Scan
Vulnerability scan +
Vulnerability scan reports +
Quarterly evaluation of vulnerability scans +

Features

Vulnerability scan

As part of the Vulnerability Scan offering, Wortell will execute automatic vulnerability scans. Vulnerability scans will get executed quarterly. As part of the vulnerability scan infrastructure and operating systems will get scanned.

Wortell uses Tenable.io to execute automatic vulnerability scans on your environment. Environments that need to be scanned can be both internet-facing as well as internal environments.

Reports scan reports

After each vulnerability scan, a report will get created. This default report contains an overview of all vulnerabilities found during the scans. This report can be used to identify weaknesses in the IT environment.

Within the report vulnerabilities are described clearly and are labeld with a priority, severity and CVE score. Aside from describing the vulnerability, Wortell provides a solution (in text) to remediate the vulnerability.

Quarterly evaluation of vulnerability scans

The vulnerability scans executed by Wortell and the reports that are generated after those scans will get evaluated quarter. This evaluation will get done by a security expert who has in-depth knowledge of cybersecurity. In this evaluation meeting results of scans will be discussed in details and advice to prioritize and remediate vulnerabilities will be given.

Cost Calculation

The cost will be calculated based on the number of assets that need to be scanned by Wortell.

Prerequisites

A physical or virtual machine to run scanner agent software needs to be available. The machine should have the following specifications:

  • Memory: 4GB (minimum), 8GB (recommended)
  • CPU: 4x 2Ghz Core
  • Diskspace: 30 GB, not including space used by the host operating system

Scope determination

The scope of the vulnerability scans is based on a list of IP addresses that is agreed upon with the customer