This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Vulnerability Management Guide"

From OWASP
Jump to: navigation, search
m
Line 12: Line 12:
 
==Description==
 
==Description==
 
<span style="color:#000000">
 
<span style="color:#000000">
The guide will demonstrate a set of best practices that organizations can use to establish an effective and efficient vulnerability management program.
+
The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored to your organizational needs. Target audience: information security practitioners of all levels, IT professionals, and business leaders.
 +
 
 +
Vulnerability Management Cycle Brief
 +
* DETECTION
 +
* REPORTING
 +
* REMEDIATION
 
</span>
 
</span>
  

Revision as of 02:36, 24 September 2018

OWASP Project Header.jpg


OWASP Vulnerability Management Guide

Vulnerability management is one of the most effective means of controlling cybersecurity risk. Yet, as indicated by the wave of massive data breaches and ransomware attacks, all too often organizations are compromised over missing patches and misconfigurations. Vulnerability management seeks to help organizations identify such weaknesses in its security posture so that they can be rectified before they are exploited by attackers. The OWASP Vulnerability Management Guide project seeks to establish guidance on the best practices that organizations can use establish a vulnerability management program within their organization. The guide provides in depth coverage of the full vulnerability management lifecycle including the preparation phase, the vulnerability identification/scanning phase, the reporting phase, and remediation phase.

Description

The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored to your organizational needs. Target audience: information security practitioners of all levels, IT professionals, and business leaders.

Vulnerability Management Cycle Brief

  • DETECTION
  • REPORTING
  • REMEDIATION

Licensing

The OWASP Vulnerability Management project is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.


Roadmap

The project roadmap includes the development and release of a version 1 of the OWASP Vulnerability Management Guide as a starting point. Community feedback and other contributions will be used to refine the guide and create future versions. The project would also be interested in language translations as that will help ensure the project is accessible to as wide an audience as possible.

Getting Involved

Involvement in the development and promotion of the OWASP Vulnerability Management Guide is actively encouraged! You do not have to be a security expert or a programmer to contribute. Some of the ways you can help are as follows:

Spreading awareness of the project Translating into a foreign language


Project Leader

Classifications

Project Type Files DOC.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png
Creative Commons Attribution ShareAlike 3.0 License