Vulnerability assessment and data risk analysis
An organization must frequently assess its systems for vulnerabilities. As a CTI, you must work with the vulnerability assessment team to evaluate the vulnerability assessment process and report on hardware, software, applications, services, and the network. The vulnerability management team is also a major consumer of tactical and technical TI output. Vulnerability assessment must be automated and easy to integrate within the TIP or SIEM. The following functionalities or tasks must be expected from your vulnerability assessment tool or framework:
- Identify the system's security flaws: Identify system weaknesses before adversaries do. Scan the entire system domains. Identify weaknesses in databases and filesystems (Structured Query Language (SQL) injection, weak credentials, extensive user privileges, missing patches, poor encryption, and many more), applications (code injection attacks), services (configuration), and network...