Ask the Expert

Handling vulnerability assessment activities

Should vulnerability assessment activities fall under the compliance key control or system development and maintenance control?

    Requires Free Membership to View

The best structure for most organizations is to have a security team responsible for carrying out vulnerability assessments. This team is usually led by a security administrator and is overseen by a CISO or CSO. Ideally, the IT operations and network group maintains the systems and the network, and a separate security team -- even if it's just one person -- assigns permission rights, configures security products, reviews logs for security incidents and carries out vulnerability assessments. These groups should be separate because each has a different focus. The network group needs to focus on time and availability. If a system goes down or network connectivity is lost, the network group will be on the hot seat. The security team has the focus of securing the environment.

If security and network responsibilities fall within one group, let's say the IT group, and it is not segregated, usually there isn't enough focus on security. To avoid any conflicts of interest, it is important that the security administrator does not report to the network administrator. The security administrator should report to the CSO and the network admin should report to the CIO. While many organizations aren't large enough or security mature enough to support this structure, it is the best one to work towards.

This was first published in December 2005

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: