Types of vulnerability scanning and when to use each (original) (raw)

denisismagilov - stock.adobe.com

Article 2 of 3

Part of: Understanding vulnerability scanning

Vulnerability scanning gives companies a key weapon when looking for security weaknesses. Discovery, assessment and threat prioritization are just a few of its benefits.

Vulnerability scanning helps organizations probe for threats across their entire IT infrastructures, from software and specialized devices to files and databases. Types of vulnerability scanning vary, but the overall technique is a key component of any cybersecurity management program. It identifies weaknesses and potential risk points for remediation before they become disruptive.

How vulnerability scanning works

Vulnerability scanning is typically performed through specialized software that examines assets attached to and using a network. The software relies on a database of recognized anomalies, often based on the CVE database of publicly disclosed threats. If a scanner finds an irregularity, it triggers an alert that displays on a user's dashboard.

Vulnerability scanners perform three primary functions:

  1. Discovery. Scanning provides a single-point-in-time view or continuous view of known and previously unknown assets.
  2. Assessment. Systems identify and highlight vulnerabilities, using data contained in the CVE database and other databases of known anomalies.
  3. Prioritization. Based on metrics programmed into the scanner, network devices use CVE data, threat intelligence and data science to assess issues and prioritize them for remediation.

It is important to differentiate between vulnerability scanning and penetration testing. The former identifies an issue, whereas pen testing provides methods to further examine an anomaly and identify ways to remove it. Together, the systems pack a powerful one-two punch for cybersecurity managers and technical staff.

Graphic of how a vulnerability scanner works

Vulnerability scanners examine all corners of the IT infrastructure.

Types of vulnerability scanning and applications

Vulnerability scanner capabilities vary. Among the different types are the following:

Challenges of using vulnerability scanners

Vulnerability scanning requires careful oversight. If a scanner's CVE database is out of date, it may fail to detect new vulnerabilities that have yet to be identified. Resource management is another challenge. Addressing issues flagged by scanners depends on the resources available to mitigate anomalies.

Continuous scanning may result in degraded network performance, as networks are processing a continuous stream of probes. To that end, the benefits of continuous scanning must be balanced against the effects it has on network performance. Manual or single-view scans, by contrast, are less intensive. But since they only examine the infrastructure at a point in time, they could miss new or highly complex anomalies.

How to select vulnerability scanners

As with any technology, the first action to take when considering vendors is to define the requirements. Some types of vulnerability scanning systems are targeted; others are more flexible and support different scanning environments. Some scanners may be part of a suite of related services such as pen testing or other diagnostic applications. Open Source vulnerability scanning is another option and may be attractive to companies that want to try the technology before making an investment.

When shopping for a vulnerability scanner, consider the following:

Vulnerability scanners provide valuable security data. Scanner outputs should be reviewed, triaged and investigated by security teams. Pair vulnerability scanning with pen testing to optimize threat management as key elements of an overall cybersecurity strategy.

Next Steps

Vulnerability management vs. risk management, compared

8 vulnerability management tools to consider

Dig Deeper on Network security

Part of: Understanding vulnerability scanning

Article 2 of 3