Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Vulnerability management is a key ongoing effort that should be part of all cybersecurity programs. Identifying the configuration of assets and patches required is an
Vulnerability management is a key ongoing effort that should be part of all cybersecurity programs. Identifying the configuration of assets and patches required is an important hardening activity. The Environment: The Environment:The organization all class members will create their program document for is a BANK.This bank has three branches in the Springfield, IL area. It has an online component where customers can log in to an online site to do banking business. There is also a mobile app that does the same functions. They have small physical data center in each bank, as well as a larger one offsite, that centralizes some functions.They also have some infrastructure in their cloud environment, which generally serve the online and app functionality. The main banking application is an internally developed solution called MYBANK and it contains most of the banking functionality. This runs in all branches, as well as in the cloud. Each branch and cloud has a database connected to MYBANK, which all sync in real time. Even though MYBANK is a modern application, the legacy system is still in place, and is running in the main data center LEGACY BANKData from LEGACY BANK is used in the MYBANK application, so a connection is always on There are a number of other applications that are "bank only" applications hosted in data center, not on cloud the provide various services, such as set up loans for various situations real estate, commercial, personal, auto, etc. these are all different apps auditing, and cash counting.The bank has about employees working in all branches, one branch is bigger and has all of the back office type functions HR Payroll, etc. They use an cloudbased ERP solution BANK OFFICE to run their back office applications. From a security standpoint, they wish to align to the NIST r standard as well as CIS for detailed technical controls. They are generally a Microsoft shop, and use the related MS tools for cybersecurity.While the above will be standard across all student program documents, that is where the similarity ends. Anything else that is added to this going forward comes from your own ideas, how you would want a bank to work, what technology it may additionally have, etc. The Question: A vulnerability management program can be wide and detailed, requiring tools and process in order to be successful. What are three activities required of a vulnerability management process that are critical for success? Don't consider exact tools or technology at this point, the goal is to flesh out the overall key process steps. Describe them and give some details on those activities based on best practices.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started