Performing CyberOps Using Cisco Security Technologies: Next Steps for Handling Unaddressed Vulnerabilities

Next Steps for Handling Unaddressed Vulnerabilities

Question

An engineer is going through vulnerability triage with company management because of a recent malware outbreak from which 21 affected assets need to be patched or remediated.

Management decides not to prioritize fixing the assets and accepts the vulnerabilities.

What is the next step the engineer should take?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

In this scenario, the engineer has identified 21 assets that are affected by a malware outbreak and need to be patched or remediated. However, the company management decides not to prioritize fixing the assets and accepts the vulnerabilities. In such a situation, the next step the engineer should take would be to acknowledge the vulnerabilities and document the risk.

Option B, which states "Acknowledge the vulnerabilities and document the risk," is the correct answer because it is essential to recognize and understand the risks associated with the vulnerabilities. The engineer should document the vulnerabilities and the potential impact they could have on the organization's infrastructure, assets, and operations.

Documentation of the vulnerabilities and associated risks is essential because it can help to provide information to management and other stakeholders about the potential impact of the vulnerabilities. This information can then be used to inform decisions on the best course of action to take, such as prioritizing the remediation of the vulnerabilities or accepting the risks.

Option A, which states "Investigate the vulnerability to prevent further spread," may also be necessary to prevent further outbreaks of malware. However, this step should ideally be taken before management decides to accept the vulnerabilities, as it could help to identify the potential impact of the vulnerabilities and the importance of remediating them.

Option C, which states "Apply vendor patches or available hot fixes," is also a valid option if the vulnerabilities can be remediated by applying patches or hot fixes. However, this may not be possible in all cases, and the decision to apply these fixes should be based on a risk assessment of the vulnerabilities and the potential impact they could have.

Option D, which states "Isolate the assets affected in a separate network," may also be a valid option if the vulnerabilities are severe and the affected assets cannot be remediated immediately. This step can help to prevent further spread of malware and limit the potential impact of the vulnerabilities. However, this should be considered as a temporary measure until the vulnerabilities can be remediated.