<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Frequency of Vulnerability Scanning in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4935#M237</link>
    <description>Monthly is Ok for All devices, and you must scan particular devices when needed.</description>
    <pubDate>Sun, 07 Jan 2018 19:08:31 GMT</pubDate>
    <dc:creator>A2jacomel</dc:creator>
    <dc:date>2018-01-07T19:08:31Z</dc:date>
    <item>
      <title>Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4127#M227</link>
      <description>&lt;P&gt;Hello folks,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I am a bit frustrated by this topic because of lots of different opinions. Let me know what do you think - how often should a company run vulnerability scans on their networks/infrastructure? I am asking about the network/server patch/hardening type of scans - not a pentest or similar. Some say - bi-weekly, others monthly, quarterly, I've even heard an annual scanning practice (in my opinion - wayyy to long). Appreciate your time.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 11:00:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4127#M227</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2017-12-05T11:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4129#M228</link>
      <description>I’d say monthly is probably sufficient in general as it will give those responsible for systems time to apply patches before you drop new info on them. It really depends on your patch cycle though. Caveats to that are:&lt;BR /&gt;&lt;BR /&gt;- after disclosure of vulnerabilities with high impact, you probably want to make sure whether you have them present or not&lt;BR /&gt;- when new assets come online, scan them specifically (may require some communication between provisioning and security)&lt;BR /&gt;&lt;BR /&gt;Also, make sure the teams responsible for deployments are updating golden images so you don’t just keep reintroducing the same vulns over and over again.&lt;BR /&gt;&lt;BR /&gt;That’s probably as much advice is fit for thumb typing.</description>
      <pubDate>Tue, 05 Dec 2017 12:30:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4129#M228</guid>
      <dc:creator>Badfilemagic</dc:creator>
      <dc:date>2017-12-05T12:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4130#M229</link>
      <description>&lt;P&gt;Depending on the network area and risk there are daily, weekly, monthly and annual scans.&lt;/P&gt;&lt;P&gt;I have heard many companies only do quarterly or annual scans. This seems insufficient by today's events.&lt;/P&gt;&lt;P&gt;But it would depend on the industry and the size of the company and regulatory impacts.&lt;/P&gt;&lt;P&gt;Many companies do a variety of each type.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike Patten&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 17:28:40 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4130#M229</guid>
      <dc:creator>pattenm</dc:creator>
      <dc:date>2017-12-05T17:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4132#M230</link>
      <description>&lt;P&gt;The frequency should depend on what you do with the results. If you do nothing with the results then you really don't need vulnerability scanning at all because nothing is going to get done. Do it once a year to satisfy the check box and meet the requirement. I have been places where they did it daily, every day. I argued it was too often because we weren't doing anything with the results.&lt;/P&gt;&lt;P&gt;Daily - if you have a team working the results and you should expect to see the list shrinking unless new vulnerabilities are released.&lt;/P&gt;&lt;P&gt;Weekly - if&amp;nbsp; you have someone doing some remediation activities during the week. If nothing was done there is no need to do another one UNLESS you want to show the cost of inactivity by an ever growing list of vulnerabilities.&lt;/P&gt;&lt;P&gt;Do you get my point here?&lt;/P&gt;&lt;P&gt;I argued that we should go to monthly or on demand scans. My plan was this:&lt;/P&gt;&lt;P&gt;1) Do a scan.&lt;/P&gt;&lt;P&gt;2) Deliver the results to the remediation team.&lt;/P&gt;&lt;P&gt;3) Perform remediations.&lt;/P&gt;&lt;P&gt;4) Ask for another scan.&lt;/P&gt;&lt;P&gt;5) If no remediation work was done at the one month mark, do another scan to show how much worse it was getting with no activity in remediation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At one agency we had a requirement for daily scans and no one wanted to change it because it had been written into the rules, so they kept doing them. At the beginning of every quarter they would do a scan and make it a POAM (Plan of Action and Milestones - i.e. list of vulnerabilities that had to be closed in 3 months). The sys admins would wait until 2 weeks before the deadline and then work like mad to try and close all of them. We would usually have to ask for an extension. At one time we had 3 of these POAMS open which meant some vulnerabilities had existed for 9 months. So was the daily scans helping to remediate the vulnerabilities? No, it just kept adding to the total. Which the scan team would then get mixed up with the new POAM results and send conflicting reports of what had to be closed for which POAM.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my recommendation is to understand why you are scanning. Is it for knowledge to force an action (i.e. we do not have enough sysadmins to work vulns, we do not have an adequate security program, etc)? or is it to check a box? Once you understand the why you will know how often to do it.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 18:02:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4132#M230</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-12-05T18:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4133#M231</link>
      <description>&lt;P&gt;Another thing to consider if you do scans of more than a month interval. Do you have someone keeping up with the latest vulnerabilities so you can jump on the very critical ones (i.e. the ones that get into the media)? You r interval will depend on your resources. You can use shorter intervals to show the need for more resources.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 18:04:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4133#M231</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2017-12-05T18:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4135#M232</link>
      <description>&lt;P&gt;I guess this really depends on your environment. I work for a natural gas pipeline company, and we do vulnerability scans on a quarterly basis. There are some exceptions to this rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, we recently made some major changes to our infrastructure and firewalls in 2 weeks. As soon as we completed the changes, and we had a stable network, we did an external and internal vulnerability scan.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The other exception is new applications. While they are still in development, the applications are heavily scrutinized.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may think that a quarterly basis is a long time between scans. We run two separate productions and DMZ networks because of NERC requirement, but the auditors seems happy with scheduling.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you're in a large or enterprise environment, then I would consider more frequent scanning.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 19:22:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4135#M232</guid>
      <dc:creator>amani</dc:creator>
      <dc:date>2017-12-05T19:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4137#M233</link>
      <description>&lt;P&gt;For some, it depends on security/maturity level. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When a company is just starting out there is a lot of clean up involved and that is just non-authenticated&amp;nbsp;scanning. &amp;nbsp;The frequency might be monthly or quarterly during this catch-up phase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not only will you find things to patch&amp;nbsp;but also you will find inventory you did not know you had.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Later you can add&amp;nbsp;&lt;SPAN&gt;authenticated scanning at the same&amp;nbsp;monthly or quarterly interval. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Once&amp;nbsp;the&amp;nbsp;authenticated scanning is looking good, start reducing the interval to match your policies and/or risk tolerance. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently, we do a full &lt;SPAN&gt;authenticated vulnerability&amp;nbsp;scan every week on every network. &amp;nbsp;The numbers from these scans can startle some. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For example, Microsoft/Adobe/Google/Oracle patches might take up to 10 days to deploy but the scanner will spot them missing in one day. &amp;nbsp;So for nine days, the score might be very low until these are deployed. &amp;nbsp;That is because a single HIGH&amp;nbsp;vulnerability missing from all of your systems (1000/1000) systems will pull the score down fast.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The way I describe is like a slow wave crashing on the shore and leaving debris behind. &amp;nbsp;You go out and pick up the mess and a few days later another wave arrives.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Besides the weekly scans, everyone is empowered to do On-Demand Scans. &amp;nbsp;As systems are being built, a few scans are required before it will ever go into production. &amp;nbsp;Follow procedures&amp;nbsp;and you have no new surprises. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Get caught up and stay caught up is the method we use.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Paul&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Dec 2017 19:43:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4137#M233</guid>
      <dc:creator>Radioteacher</dc:creator>
      <dc:date>2017-12-05T19:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4143#M234</link>
      <description>&lt;P&gt;On thing that I think will happen is that we'll see it getting 'faster' or at least we'll see the 'frame rate' increasing on patching.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had an interesting example of anticipation from Microsoft in Windows 10, the self proclaimed&amp;nbsp;&lt;A href="https://www.theverge.com/2015/5/7/8568473/windows-10-last-version-of-windows" target="_self"&gt;last ever version of Windows&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Essentially it's still shipping new versions of Windows under windows 10, just one or two a year rather then was we'd become used to &lt;A href="https://www.theverge.com/2017/4/20/15374864/microsoft-windows-10-update-september-2017" target="_self"&gt;before Win10&lt;/A&gt;. The most pertinent&amp;nbsp;data point here is that Windows 10 has a habit of breaking third party disk encryption in it's A&lt;A href="https://community.spiceworks.com/topic/1764724-hp-drive-encryption-and-windows-10-anniversary-update" target="_self"&gt;nniversary&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://kc.mcafee.com/corporate/index?page=content&amp;amp;id=KB89000" target="_self"&gt;Creator's&lt;/A&gt;&amp;nbsp;updates. Never used to be the case, and by &amp;nbsp;electing to essentially reinstall on much faster cycle Microsoft can be much more agile, address issues more quickly etc, etc &amp;nbsp;- IMHO &amp;nbsp;it's helps that innovation around PCs has slowed as well, as this means less exiting goes of hunt the driver.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So why's that relevant? Well if you think of the OS as the slow tick in the system and real updates are much quicker at the OS and leave less cruft behind then application releases, maintenance packs and hot fixes etc become quicker to deal with this, and then there is a more of point in scanning more frequently. In fact maybe a lot of component systems in on prem-data centers follow the 'Cattle not Kitten's' paradigm and don't live long enough to be scanned unless you are very quick, and you look at compliance in base images and weed out deviating systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 06:49:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4143#M234</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-12-06T06:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4146#M235</link>
      <description>&lt;P&gt;As the other answers have already said - it depends.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, one key thing to keep in mind is the difference between scanning and reporting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are able to scan weekly, with no significant impact on the target systems or intermediate systems (e.g. fragile firewalls) then set this weekly.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can then set the reporting period to match the compliance framework whether this is monthly or quarterly, yet have confidence that your data is not more than 1 week old should you need to query it.&amp;nbsp; It will likely be easier to change the reporting schedule than scanning schedule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my environment with have a mixture of daily and weekly scanning, with weekly or monthly reporting and action tied into patch schedules.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Don't forget to include processes to catch systems not scanned for whatever reason, e.g. authenticated scan failures, new systems added, BYOD if applied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And try and build the business case to move to use scan agents on target systems where supported.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 08:30:37 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4146#M235</guid>
      <dc:creator>pcatt</dc:creator>
      <dc:date>2017-12-06T08:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4168#M236</link>
      <description>&lt;P&gt;Agreed. I think sometimes,&amp;nbsp;we tend to&amp;nbsp;look for a "standard" answer when there really isn't. Like anything else security related, monitoring/maintenance is a very specific task that needs to be tailored to the environment. And even then, there may be multiple standards depending on the types of systems they may be using.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the end, there are a lot of factors that goes in to scheduling scans. For some places,&amp;nbsp;certain systems may be static enough and the criticality of information stored/processed&amp;nbsp;is such that an annual scan is sufficient. And the flip-side may also be true where you'll need to do scans every few days because how its used.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally, the answer comes down to - it needs to be as frequent as the risk assessment dictates.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2017 16:54:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4168#M236</guid>
      <dc:creator>MarkyMark</dc:creator>
      <dc:date>2017-12-06T16:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4935#M237</link>
      <description>Monthly is Ok for All devices, and you must scan particular devices when needed.</description>
      <pubDate>Sun, 07 Jan 2018 19:08:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4935#M237</guid>
      <dc:creator>A2jacomel</dc:creator>
      <dc:date>2018-01-07T19:08:31Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4960#M238</link>
      <description>As all my predecessors already stated the answer is (as usual) it depends: - How fast are your admins in mitigating this? If they need 4 weeks, then you don't need to do a weekly/daily scan. - Is the scanning already well established or is there a ****load of work to do before they can even think of being "clean" or resolving "new" vulnerabilities - Are the assets in a more static (OT) or agile (Cloud, Docker) environment? Doing a quarterly scan of a docker environment is almost as useful as a daily scan on OT assets when there is a downtime only every 6 months - You should always be able to run ad-hoc scans for "trending" vulnerabilities. - Are there any restrictions that only empower you to scan in specific intervals? - Are there policies regulating this and do they make sense? This all needs to be considered and the outcome is not only company but network-specific.</description>
      <pubDate>Mon, 08 Jan 2018 08:50:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4960#M238</guid>
      <dc:creator>timo</dc:creator>
      <dc:date>2018-01-08T08:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4994#M239</link>
      <description>There are some vulnerabilities that can be remediated easily, for example default root or admin passwords, the use of telnet, Services not requiered as ntp server, or default snmp communities. These vulnerabilities could be activated in any momment by an administrative error, and is a good practice to detect it and remediate it as soon as possible. I think that monthly is good for this, but depend of your business hability to scan, analyze, report and correct it.</description>
      <pubDate>Mon, 08 Jan 2018 12:41:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/4994#M239</guid>
      <dc:creator>A2jacomel</dc:creator>
      <dc:date>2018-01-08T12:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5024#M240</link>
      <description>&lt;P&gt;When we updated to a new Vulnerability scanner a couple of years ago, we moved to a model where:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Externally Facing Systems (DMZ) Scanned from outside of our network:&amp;nbsp; Weekly Non Authenticated&lt;/P&gt;&lt;P&gt;Externally Facing Systems (DMZ) Scanner from inside of our network:&amp;nbsp; Weekly Authenticated&lt;/P&gt;&lt;P&gt;Sites/Offices/Remote Offices Scanned monthly from inside of our network using Authenticated scans&lt;/P&gt;&lt;P&gt;Special Groups which may need closer monitoring, weekly if externally facing.&lt;/P&gt;&lt;P&gt;Remediation scans (we think we fixed it but want to be sure before closing ticket), on demand as needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Weekly all of the various scans completed are compiled and Tickets for remediation are issued for new vulnerabilities, or updates to currently working tickets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 16:24:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5024#M240</guid>
      <dc:creator>gerrydalton</dc:creator>
      <dc:date>2018-01-08T16:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5071#M241</link>
      <description>&lt;P&gt;All the above, takes human resources to ensure they are up and working correctly, and this will only keep rising in terms of amount of effort and associated costs due to increased compliance requirements, regardless of whether you have to comply with Sarbanes Oxley or PCI DSS etc.&amp;nbsp; The costs of compliance are increasing, as we become increasing more complex, more integrated with over 1200 + different types of technologies and associated vendors.&amp;nbsp; Given the issues with WannaCry and the number of organisations, which were caught literally with their pants, surely must be warning of what is on the horizon and possibly in 2018.&amp;nbsp;&amp;nbsp; I believe vulnerability scanning should be constant, aligned to a known asset inventory, software licensing and support contracts, but applied in accordance to an agreed and approved baseline for your respective organisations.&amp;nbsp; Passive scanning against those agreed baselines, will quickly highlight issues and semi-automate the patching of systems from authorised sources.&amp;nbsp; We should be thinking more in alignment with our own human bodies immunity system, and apply the same approach to our business systems, protect them and you reduce the risk of being compromised and keep it working as your clients expect it should be resilient at all times.&amp;nbsp; If you are doing testing on new solutions or devOps, there are plenty of providers who provide online formal testing capabilities, without having to go through the six week wait for a Statement of Work, before the test can commence, it should be available on demand with the space of 24 hours.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 19:38:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5071#M241</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-01-08T19:38:18Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5078#M242</link>
      <description>&lt;P&gt;Depends on your preference and appetite for vulnerability scanning and remediation. I like bi-weekly scans to track and discover devices on the network, but I prefer weekly scans for straight vulnerability scanning.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Weekly scans allow me to not only fully ultilize our tools, but paint a picture of our vulnerability landscape and the good work our team does to remediate issues to upper management. As well as this, even if you're not patching on a weekly basis, it gives you another avenue for tracking any critical patches/ advisories that might need to be applied and where they are needed (as well as blogs/ alerts). If an advisory comes out and you're scanning monthly/ quarterly, either it will be a while before you can confirm where the vulnerability is, or you might be halting production processes to scan immediately.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 21:19:19 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5078#M242</guid>
      <dc:creator>FrankNsubuga</dc:creator>
      <dc:date>2018-01-08T21:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5085#M243</link>
      <description>&lt;P&gt;Depends on what you are using to run those vulnerability scans, what you are scanning and how intrusive the scans are.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are talking about a production environment, I would say weekly with Nessus (using only tests that do not require logon credentials).&amp;nbsp; If a 'protected' development or office area, perhaps you can get by with every 2 weeks.&amp;nbsp; If using nessus with plugins that use logon credentials, I would say maybe monthly in production and make sure people are notified to avoid unfortunate problems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One way to figure out what the scanning tools/profiles/schedules should be is to run one scan and see how many vulnerabilities are found.&amp;nbsp; If a LOT of vulns are discovered, perhaps you should run more frequent scans until the general hygiene of the network improves.&amp;nbsp; Remember to update the scanner, the plugins and the profile as new issues are discovered.&amp;nbsp; At least monthly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 00:56:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5085#M243</guid>
      <dc:creator>Edd</dc:creator>
      <dc:date>2018-01-09T00:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5086#M244</link>
      <description>&lt;P&gt;All good points, all of which can be automated and scheduled on a regular basis with appropriate centralised solutions, and fully integrated into SIEM for tracking and Incident response purposes.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 01:00:06 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5086#M244</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2018-01-09T01:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5093#M245</link>
      <description>&lt;P&gt;Thank you all for your inputs - really useful.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 06:12:45 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5093#M245</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-01-09T06:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: Frequency of Vulnerability Scanning</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5197#M246</link>
      <description>&lt;P&gt;I’d recommend monthly for internal networks and at least weekly for anything internet facing.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2018 03:25:47 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Frequency-of-Vulnerability-Scanning/m-p/5197#M246</guid>
      <dc:creator>Clayjk</dc:creator>
      <dc:date>2018-01-12T03:25:47Z</dc:date>
    </item>
  </channel>
</rss>

