Security OperationsAlso called: "vuln management"
Effective vulnerability management balances scan coverage with pragmatic prioritization so teams fix the issues that matter most.
Lifecycle steps
- Discover assets and the software they run.
- Assess vulnerabilities via scanning, penetration testing, and threat intelligence.
- Prioritize based on exploitability, business impact, and exposure.
- Remediate through patching, configuration changes, or compensating controls.
Modern practices
- Align findings with frameworks like CVSS, KEV, and exploit intelligence.
- Integrate with ticketing systems to assign clear owners.
- Measure patch latency for critical systems.
Related Tools
Explore More Security Operations
View all termsEndpoint Detection and Response (EDR)
Security software that monitors endpoints for malicious activity, enabling rapid detection and containment.
Read more →Security Information and Event Management (SIEM)
A platform that ingests security telemetry, correlates events, and surfaces alerts for investigation.
Read more →Security Operations Center (SOC)
A dedicated function responsible for monitoring, detecting, and responding to cybersecurity threats in real time.
Read more →