Is a Periodic Vulnerability Analysis Performed and Are Findings Managed with Defined Closure Deadlines?
Table of Contents
Description
wolkvox conducts periodic vulnerability analyses as an integral part of its Information Security Management System (ISMS). This process follows a rigorous procedure for identifying, classifying, and remediating vulnerabilities, based on recognized standards such as OWASP Top 10 and CVE (Common Vulnerabilities and Exposures).
Analyses are performed internally every six months and annually by specialized third parties, including ethical hacking tests to evaluate system robustness. Each finding is managed through a specific treatment procedure, prioritized in a security backlog, and assigned a maximum remediation deadline of 90 days. Additionally, clients may conduct their own analyses, always coordinated with wolkvox to ensure a clear and secure scope.
Features
Vulnerability Analysis and Detection
- Defined frequency: Internal evaluations every six months and annual assessments by third parties ensure continuous and objective review.
- Reference standards: Vulnerabilities are identified and classified according to OWASP Top 10 and CVE, ensuring alignment with global best practices.
- Ethical hacking: Penetration tests conducted by experts simulate real attacks to uncover hidden vulnerabilities.
Findings Management
- Criticality classification: Findings are prioritized based on their potential impact (high, medium, low) on business security and operations.
- Security backlog: Each vulnerability is recorded in a tracking system, with assigned responsibilities and deadlines for treatment.
- Closure deadlines: A maximum of 90 days is established to implement solutions such as updates, hotfixes, or configuration changes.
Treatment and Remediation
- Multidisciplinary teams: Remediation involves security, development, infrastructure, and vendor teams to ensure a coordinated response.
- Rigorous follow-up: Progress on corrective actions is monitored until closure, with periodic reports to senior management.
- Post-remediation validation: After applying solutions, systems are verified to confirm that vulnerabilities have been effectively mitigated.
Client Collaboration
- Coordinated analyses: Clients may conduct their own vulnerability tests, but must coordinate with wolkvox to define scope and avoid service impacts.
- Findings reporting: Clients can report discovered vulnerabilities, which are integrated into wolkvox’s management and remediation process.