Vulnerability Assessment Clause Samples
POPULAR SAMPLE Copied 36 times
Vulnerability Assessment. The supplier must use commercial products or freeware (e.g., Nessus) for vulnerability assessment and/or penetration testing of the segment(s) on which servers hosting Symantec information are logically located. The supplier must specify the name and version of the network-based vulnerability assessment tool(s) used. The supplier must conduct vulnerability assessment and/or penetration testing at least twice a year. The supplier must submit the vulnerability assessment and/or penetration testing report(s) to Symantec’s Information Security upon request. The supplier must agree to Symantec-conducted vulnerability assessment scans of the portion of its extranet to be used to service Symantec.
Vulnerability Assessment. Based on the potential current and future climate change impacts to sustainable forest management, a workshop will be held with the Woodlands Staff facilitating discussions to identify where the NFMC forest management system is vulnerable to climate change (adaptation is needed), and where opportunities for positive impacts could occur (enhanced by adaptation). Each impact will be ranked based on the potential effect (exposure and sensitivity) on the system and whether the system is resilient17 and has the adaptive capacity18 to cope with the impact. Uncertainties19 and knowledge gaps are considered vulnerabilities. The vulnerability rankings will be subjective and based on the information and knowledge available (including engagement feedback) to the Woodlands Staff at that time. Once the climate change impacts have been ranked based on vulnerability, the Woodlands Staff will narrow down which impacts are most vulnerable and require adaptations. The vulnerability assessment allows the Woodlands Staff to focus on impacts where they can influence the most change.
Vulnerability Assessment. The final step brings the three previous analyses together. While final outputs will be decided upon collaboratively with the client, we anticipate illustrating climate vulnerability using maps, tables and figures, and narrative text to explain the different determinants and considerations of climate vulnerability. We anticipate a final report being approximately 20-25 pages.
Vulnerability Assessment. Consultant shall ensure all cloud applications are securely coded, vetted and scanned. Consultant shall: (i) conduct a third-party independent vulnerability assessment annually or sooner if due to compliance regulations or other requirements, or upon a major change to the solution; (ii) provide vulnerability assessment results to Board on an annual basis during the period the Consultant is subject to the terms of this Addendum; (iii) identify and validate vulnerabilities required for remediation; and iv) ensure patching is up to date.
Vulnerability Assessment. This portion of the project will focus on conducting a vulnerability assessment to determine if current network security controls are vulnerable to actionable attacks from a malicious intruder that has gained access to the network either physically or virtually. This level of testing validates corporate security policy and development standards by identifying the resiliency of the internal network against determined intruders. Activities will include: • Up to 40 Servers, 1 Operating System, 800 Workstations running Windows, 20 Network Devices, 1 mainframe, 1 Enterprise Firewall, and 1 database will be considered in scope for this vulnerability assessment • Internal vulnerability testing from the County’s office, or datacenter, covering production servers and network devices to include: o Credentialed and non-credentialed testing o Manual and automated testing and use of commercial and open source tools o Use of information captured in the previous tasks to validate vulnerabilities, test exploitation, and measure effectiveness of controls o Creative techniques to include business logic analysis and manual exploit creation • Objectives based testing designed to identify and validate high risk vulnerabilities to include: o Privilege Escalation o Sensitive Data Access o Data exfiltration
Vulnerability Assessment. Research, develop, and implement methods, based on autonomic discovery and table top war gaming by a combined team of cyber and mission domain experts, to conduct a systematic assessment of MEF susceptibility to process failures and the vulnerability of atomic cyber processes and inter-process communication to accidents and attacks.
Vulnerability Assessment. The final phase (the “Vulnerability Assessment”) evaluates the most exposed assets and considers their on their intersection with inundation and shore recession layers and the basis for the highest vulnerability assets were described. This analysis points to assets or parts of assets that should be prioritized for management and adaptation actions, and which may need engineering analysis and future design work/retrofits to maintain access and operation.
Vulnerability Assessment. IDVerifact shall regularly conduct risk assessments, vulnerability scans and audits (including third-party penetration testing of the SaaS Services twice annuallyand software upon each new version release). Identified product solution issues shall be scored using the Common Vulnerability Scoring System (CVSS) risk-scoring methodology based on risk impact level and the likelihood and potential consequences of an issue occurring. Vulnerabilities are remediated based on assessed risk. Upon request from Customer, IDVerifact shall provide information about the identified vulnerabilities and the measures taken to remediate or address any such vulnerabilities.
Vulnerability Assessment. Defendant will agree to implement automated vulnerability scanning tools that cover its systems and will set policies for prompt remediation; (c) Firewall Implementation – Defendant agrees to enhance existing firewall protections; (d) Remote Access – Defendant agrees to enhance existing multi-factor authentication processes for remote access. Defendant will have access to features to alert it of unsuccessful administrative account logins; (e)
Vulnerability Assessment. 2.7.1. A process must be established to identify and assess the vulnerabilities and relevant controls in the environment to be assessed (e.g. penetration testing, red team testing).
2.7.2. Continuous vulnerability scanning must be utilised to identify security and patch deficiencies.