Vulnerability scanning and management for ISO 27001
Overview of ISO 27001
Overview of ISO 27001
ISO 27001 is a compliance standard managed by the International Organization for Standardization. To comply with ISO 27001 your business must create an Information Security Management System (ISMS). The goal of ISO 27001 is to assess the risks to your organization and then mitigate them by establishing effective risk management processes.
Security control A.12.6.1 covers the details of technical vulnerability management. Some of the processes you will need to establish for an ISO vulnerability management program include:
Maintain an asset inventory.
Identify tasks and assign roles and responsibilities.
Define your risk remediation timelines.
Maintain an audit log.
Continually improve the effectiveness of your information security management system.
HostedScan provides vulnerability scanning and vulnerability management tools to help your business identify weaknesses and track your remediation history.
Comprehensive set of vulnerability scanners for networks, servers, websites, and APIs.
Automated recurring scanning on a monthly, weekly, or daily schedule
Email alerts for any new findings
Reports and dashboard for vulnerability management and tracking remediation
HostedScan is 100% read-only, and will never make any modifications to your servers.