This crucial initial step ensures that all relevant assets and services are recognized and documented for scanning.
Understanding the scope of your vulnerability management process is vital.
Are all necessary systems included? Consider both hardware and software, as well as cloud services.
Be aware of compliance requirements, as applicable regulations may dictate certain assets or services be prioritized.
Utilize asset management tools to aid in identification.
- Review existing asset inventories
- Consult with stakeholders
- Utilize automated discovery tools
- Document asset characteristics
- Maintain an up-to-date asset repository