version_locking_legacy_environments
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
version_locking_legacy_environments [2019/01/23 22:39] – [Auditing Your Hosts] sgriggs | version_locking_legacy_environments [2019/01/23 22:40] – [Evaluating the Results Like a Compliance Auditor] sgriggs | ||
---|---|---|---|
Line 98: | Line 98: | ||
Let's take a moment to discuss " | Let's take a moment to discuss " | ||
- | Penetration Scanners | + | __Penetration Scanners__ |
* NMAP | * NMAP | ||
* Kali Linux | * Kali Linux | ||
Line 133: | Line 134: | ||
So, for each vulnerability that you've determined is potentially valid put on your auditor hat and ask several questions. | So, for each vulnerability that you've determined is potentially valid put on your auditor hat and ask several questions. | ||
- | Audit Questions about Vulnerabilities | + | __Audit |
* Do you have a policy about vulnerabilities? | * Do you have a policy about vulnerabilities? | ||
* Do you have a policy about this vulnerability? | * Do you have a policy about this vulnerability? |
version_locking_legacy_environments.txt · Last modified: 2019/01/25 21:20 by sgriggs