Reader small image

You're reading from  Enterprise Cloud Security and Governance

Product typeBook
Published inDec 2017
PublisherPackt
ISBN-139781788299558
Edition1st Edition
Tools
Right arrow
Author (1)
Zeal Vora
Zeal Vora
author image
Zeal Vora

Zeal Vora works as a DevSecOps Engineer primarily in the area of Defensive Security. He spends his days protecting and implementing security controls to help mitigate attacks both on the Cloud and servers. He is actively involved in security consultation, helping various startups which have been breached to overcome the breach and start again with a secure infrastructure.
Read more about Zeal Vora

Right arrow

Risk mitigation

Risk mitigation involves either fixing the vulnerability or providing some kind of control through which the likelihood or the impact of the flaw is taken care of.

For example, there is a high-level vulnerability in an OpenSSH server. The patching of software might take some time, so in order to mitigate the risk, the system administrator has only allowed the office IP to be able to connect via SSH to the servers.

A sample scan report

Now that we understand the basics of vulnerability, CVSS scores, and risks, we will take a sample vulnerability assessment report of one of the workstations and understand more about it. This scan has been performed by Nessus:

If we look at the previous screenshot, we can see...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Enterprise Cloud Security and Governance
Published in: Dec 2017Publisher: PacktISBN-13: 9781788299558

Author (1)

author image
Zeal Vora

Zeal Vora works as a DevSecOps Engineer primarily in the area of Defensive Security. He spends his days protecting and implementing security controls to help mitigate attacks both on the Cloud and servers. He is actively involved in security consultation, helping various startups which have been breached to overcome the breach and start again with a secure infrastructure.
Read more about Zeal Vora