Vulnerability Assessment
Identify known security flaws using automated tools.
INCLUDED IN:
Operational Phase
01
Scan Policies
Configuring safe checks vs aggressive exploitation.
02
Credentialed Scanning
Scanning with authentication for deeper insight.
03
Risk Scoring
Calculating CVSS scores to prioritize fixing.
04
Reporting
Generating executive and technical remediation reports.