{"id":5293,"date":"2019-06-07T18:58:58","date_gmt":"2019-06-07T17:58:58","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5293"},"modified":"2021-07-12T14:23:03","modified_gmt":"2021-07-12T13:23:03","slug":"vulnerability-management-best-practices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices","title":{"rendered":"Vulnerability Management Best Practices"},"content":{"rendered":"<p>In 2018, network vulnerabilities accounted for<a class=\"ext\" href=\"https:\/\/www.prnewswire.com\/news-releases\/edgescan-release-the-2019-vulnerability-stats-report-300800162.html\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a081% of all company security breaches<\/a>. On top of that, it takes on average up to 69 days to patch a critical web application vulnerability and 65 days to patch a similar vulnerability for an internal network. In this context, it would be safe to say that strong vulnerability management is one of the most important cybersecurity measures for managed services providers (MSPs) to implement for their customers.<\/p>\n<p>Implementing new vulnerability management systems can be a challenge. There are many moving parts, from technical processes to policy implementation. By using the vulnerability lifecycle model as a roadmap, you can implement vulnerability management best practices to protect your customers\u2019 networks from emerging security threats.<\/p>\n<h3><b>What is vulnerability and patch management?<\/b><\/h3>\n<p>Vulnerability management is the practice of identifying, mitigating, and repairing network vulnerabilities. Organizations use vulnerability management as a proactive process to improve security in company applications, software, and computer networks. When implemented well, vulnerability management can help an organization be significantly safer from security breaches and data theft.<\/p>\n<p>Similarly, patch management is the deployment of a computing patch to repair a network vulnerability. A patch is a set of changes made to a program that is designed to update, fix, or improve its functionality. Handling this process well is crucial, as over 80% of security breaches are a result of<a class=\"ext\" href=\"https:\/\/dzone.com\/articles\/80-of-breaches-still-result-of-poor-patch-manageme\" target=\"_blank\" rel=\"noopener noreferrer\">\u00a0poor patch management<\/a>.<\/p>\n<p>Before jumping into the specifics of vulnerability management and best practices, it\u2019s important to understand the distinctions between vulnerabilities and security risks, since the terms are often conflated. A security risk describes the potential for loss, damage, or destruction of an asset. A vulnerability describes a specific weakness an attacker can exploit to perform unauthorized actions within a computer system. Although risks take vulnerabilities into account (and evaluate them alongside threats and assets), they are not one and the same. Understanding this difference, and explaining it to your customers, is the first step in improving security practices.<\/p>\n<p>Other important terms to understand in this area of cybersecurity are threats and assets.<\/p>\n<p>Assets are usually intellectual property, information, and sometimes people\u2014any item that can be assigned a value. Sometimes these are intangible things like a person\u2019s reputation or proprietary information. Generally,<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/use-cases\/it-asset-discovery-tools\">\u00a0customer assets\u00a0<\/a>may be things like databases, software code, or important company records. Likewise, threats can be described as anything that can exploit a vulnerability and obtain or damage one of these assets.<\/p>\n<h3><b>What is the vulnerability management lifecycle?<\/b><\/h3>\n<p>The vulnerability management lifecycle describes the specific steps that need to be continually addressed in vulnerability management. Specifics will vary from organization to organization but there are several elements that will be relevant and useful for most MSPs:<\/p>\n<ul>\n<li><b>Discover:<\/b>\u00a0Know where network weaknesses are<\/li>\n<li><b>Prioritize:<\/b>\u00a0Categorize assets into groups and assign a value based on how critical they are to your customers\u2019 operations<\/li>\n<li><b>Assess:<\/b>\u00a0Evaluate your customers\u2019 willingness and ability to take risks based on asset criticality and potential threats<\/li>\n<li><b>Report:<\/b>\u00a0Measure the level of risk associated with your customers\u2019 assets according to their organizations\u2019 security policies<\/li>\n<li><b>Remediate:\u00a0<\/b>Prioritize and fix vulnerabilities in accordance with their assigned risk<\/li>\n<li><b>Verify:\u00a0<\/b>Ensure that threats have been eliminated<\/li>\n<\/ul>\n<p>If you address all of these steps in your vulnerability management service, you have the best odds of keeping your customers\u2019 networks protected.<\/p>\n<h3><b>What is the vulnerability management process?<\/b><\/h3>\n<p>The vulnerability management process takes into account the above mentioned management lifecycle and uses it as a guide for action. Here are some primary processes you should help your customers implement to improve their vulnerability security and keep their networks protected:<\/p>\n<ul>\n<li><b>Check for vulnerabilities:\u00a0<\/b>Network scans, firewall logs, and\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/dos-and-donts-diy-pen-testing\">penetration testing<\/a>\u00a0are all important vulnerability management<b>\u00a0<\/b>tools for locating any weak points customer networks may have. You should use these tools on a regular basis and consider automating them if possible.<\/li>\n<li><b>Identify the vulnerabilities:<\/b>\u00a0Using the data generated from the logs, tests, and scans, you can locate any anomalies that might suggest foul play on your customers\u2019 networks (malware attacks, suspicious activity, etc.).<\/li>\n<li><b>Verify the vulnerabilities:\u00a0<\/b>Determine if the identified vulnerabilities have the potential to be exploited on servers, applications, networks, or other systems.<\/li>\n<li><b>Mitigate vulnerabilities:<\/b>\u00a0If a patch cannot be issued quickly or if there is no patch solution for a given vulnerability, you will need to come up with placeholder solutions for your customers and their assets. You might consider taking the affected part of a system offline or otherwise quarantining an attack.<\/li>\n<li><b>Patch vulnerabilities:\u00a0<\/b>Once you\u2019ve identified a vulnerability and assessed that it poses a serious risk, it\u2019s time to patch. Patches can usually be obtained or purchased from the vendors of the affected software or hardware.\u00a0Try to schedule patching\u00a0so that it doesn\u2019t interfere with user activity, if possible.<\/li>\n<\/ul>\n<h3><b>How to Improve vulnerability management strategy<\/b><\/h3>\n<p>All of the actions proposed by vulnerability management processes address the concerns and steps laid out by the lifecycle model, but they are not the only actions MSPs can take to improve their vulnerability management services. Here are some additional best practices we recommend you implement for customers.<\/p>\n<p>First, invest in your penetration tests services as much as possible so you can improve the discovery of weaknesses in your customers\u2019 networks. This is the first step of the lifecycle model and if it\u2019s not done well, it will severely limit the success of your vulnerability management efforts. Penetration techniques are used to evaluate the safety and security of a network in a controlled manner. If you want to offer your customers the best odds of\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/penetration-testing-methods\">locating their vulnerabilities in their networks<\/a>, you\u2019ll need to make sure your testing services are top notch.<\/p>\n<p>Second, one of the best ways to prioritize and assess your customers\u2019 assets is to inventory their systems. It can help to identify deployed technologies that might be putting their systems at risk. One of the things you can do to help customers in this endeavor is to classify their network assets by platform. You should also identify which defensive tools are already in place.<\/p>\n<p>Employing a vulnerability management service would be moot without offering sufficient patch servicing as well. After all, patching is often the only way you can remediate the identified threats to customers\u2019 vulnerabilities. Because patching is complicated and tedious, most small and medium-sized businesses can\u2019t run them themselves. This increases the demand for effective patch management on the MSP\u2019s side, and as that demand rises, you will need to improve on your own services or risk falling behind the competition. One way to do this is to consider using an automated patch management solution, which can help you stay on top of your many customers&#8217; ongoing updates and network scans.<\/p>\n<p>Without a vulnerability management program in place, your customer&#8217;s network security will be blind to potential threats. Although introducing a new vulnerability management process within a customer\u2019s organization can be challenging, it\u2019s made easier by following the lifecycle model closely. Implementing the cycle\u2019s guidelines will help you deploy an effective vulnerability management service for your customers&#8217; computer systems. Explore our product suite for additional\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/threat-monitor\">vulnerability management capabilities and services<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2018, network vulnerabilities accounted for\u00a081% of all company security breaches. On top of that, it takes on average up to 69 days to patch a critical web application vulnerability&#8230;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5293","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Vulnerability Management Best Practices - N-able<\/title>\n<meta name=\"description\" content=\"Utilize the vulnerability lifecycle model to organize vulnerability management best practices that can be implemented to protect your network and users from threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerability Management Best Practices - N-able\" \/>\n<meta property=\"og:description\" content=\"Utilize the vulnerability lifecycle model to organize vulnerability management best practices that can be implemented to protect your network and users from threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-07T17:58:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-12T13:23:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Vulnerability Management Best Practices\",\"datePublished\":\"2019-06-07T18:58:58+01:00\",\"dateModified\":\"2021-07-12T13:23:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices\"},\"wordCount\":1189,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices\",\"url\":\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices\",\"name\":\"Vulnerability Management Best Practices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\"},\"datePublished\":\"2019-06-07T18:58:58+01:00\",\"dateModified\":\"2021-07-12T13:23:03+00:00\",\"description\":\"Utilize the vulnerability lifecycle model to organize vulnerability management best practices that can be implemented to protect your network and users from threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerability Management Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#website\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/pt-br?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/pt-br\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Vulnerability Management Best Practices - N-able","description":"Utilize the vulnerability lifecycle model to organize vulnerability management best practices that can be implemented to protect your network and users from threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices","og_locale":"pt_BR","og_type":"article","og_title":"Vulnerability Management Best Practices - N-able","og_description":"Utilize the vulnerability lifecycle model to organize vulnerability management best practices that can be implemented to protect your network and users from threats.","og_url":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2019-06-07T17:58:58+00:00","article_modified_time":"2021-07-12T13:23:03+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"N-able","Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Vulnerability Management Best Practices","datePublished":"2019-06-07T18:58:58+01:00","dateModified":"2021-07-12T13:23:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices"},"wordCount":1189,"publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"articleSection":["Security"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices","url":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices","name":"Vulnerability Management Best Practices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/pt-br#website"},"datePublished":"2019-06-07T18:58:58+01:00","dateModified":"2021-07-12T13:23:03+00:00","description":"Utilize the vulnerability lifecycle model to organize vulnerability management best practices that can be implemented to protect your network and users from threats.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/pt-br\/blog\/vulnerability-management-best-practices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/pt-br\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Vulnerability Management Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/pt-br#website","url":"https:\/\/www.n-able.com\/pt-br","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/pt-br#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/pt-br?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/pt-br#organization","name":"N-able","url":"https:\/\/www.n-able.com\/pt-br","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/pt-br#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/comments?post=5293"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/posts\/5293\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/pt-br\/wp-json\/wp\/v2\/media?parent=5293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}