How to Evolve Your Legacy VM Practice to a Risk-based VM Program - Step Four: Remediate
Are you looking to streamline your remediation efforts? Follow these step-by-step instructions.
The most effective security teams not only know how to prioritize risks — they also embrace a strategic approach to remediation, applying patches where they can have the most benefit while using mitigating controls in cases where a patch or upgrade may not be feasible.
In the fourth of our five-part risk-based VM Solution Guide, we provide step-by-step instructions on the "Remediate" stage of the risk-based VM lifecycle, the crucial phase where your VM groundwork gets put into action. We'll walk you through the three potential responses you can take for each vulnerability.