The vulnerability management program can be elevated from good to great by close and tight integration with several key associated systems Credit: Pashaignatov / Getty Images A good vulnerability assessment program has many elements including risk prioritized endpoint groups and scheduled vulnerability scans followed by result reviews. However what differentiates a good program from a great program is a strong integration of the vulnerability management program with other key business and technical systems and processes.A truly powerful and great vulnerability program will tie into three of these critical systems and business processes.Inventory managementPatch managementApplication securityRisk managementInventory management A good vulnerability management system requires a good inventory system. If the systems to be scanned do not show up on the inventory management system then the system will not show up on the vulnerability scans and consequently will not be patched. So before moving along too far ahead in the vulnerability program it is good to stop and evaluate the coverage of the inventory management tool.Oftentimes the patch management tool and the inventory tools are part of the same large system. So the inventory tool will find and inventory the endpoints while the patch management tool will then patch the inventoried machines. The inventory system or the patch system also allows the inventoried endpoints to be grouped into various classifications for patch deployment. For example, test servers may go into one group while workstations at low risk offices may land up in another group and mission critical server will comprise yet another group. [ ALSO ON CSO: Vulnerability management tools: Dos and don’ts ]The vulnerability management system should also include servers in the cloud. Many vulnerability management systems now provide scanning services for cloud based servers that in addition to the usual vulnerability results also inventory users and systems in the cloud. Patch management A good vulnerability management program drives a good patch management and server hardening program. The vulnerability management program validates that the patch management program is working as designed. The vulnerability management program can also verify that the hardened server baseline is indeed setup in production as designed.If the patch management program is designed to patch for critical and severe patches then the vulnerability management program will reflect a drop in the related critical and severe vulnerabilities and a different trend on the remainder high, medium and low level patches.Also a vulnerability program can identify gaps in the patch management program by identifying endpoints that consistently fail the patching process or certain vendor patches that are chronically on the vulnerability list but never patched. A regular and periodic vulnerability program that has vulnerability scans running in chronological tandem with the patch deployment schedule will also determine the timeliness of the patch management program by identifying patches that should have been applied within the patch time window.Application securityVulnerability scanning of hardware servers and systems can also tie into the application scanning of related web servers and clients (which is also part of a comprehensive application security program). Modern vulnerability scanners now offer web based scanning services as part of the whole vulnerability management system which can also include patching services and Web application firewall updates. Risk management process Having the vulnerability management program closely tied into the risk management program allows the risk management program to get quality deterministic data for the associated risk. Typically assets in a risk register are qualified by subjective and qualitative risk assessments which while good, are a poor substitute for actual data.So while it is good to classify a particular server as medium, high or low risk per the subjective residual risk classification matrix, it is far better to have a residual risk evaluation using an objective data source of actual vulnerability scan results. For example, a server that shows scan results of no vulnerabilities with a CVSS score of 4.0 or higher, may now be classified in the risk register as low risk (per the company risk model). The risk rating which is now sourced from the vulnerability data provides a lot more confidence than a subjective rating provided as an opinion from say someone on the information security or network team. Ideally the risk management software should be able to pull the vulnerability scan data directly into the risk register to link the scan data to the server risk. The risk register can then be regularly updated with the scan results, providing an updated and accurate deterministic view of the risk. This functionality may not be commonly available and still require some amount of manual linkage between the risk register and vulnerability data.A close integration and tight loop with inventory management, patch management, application security and risk management can elevate a great vulnerability program into a top notch and great business system and process. Related content tip The best free weapon to fight phishing fraud A free tool that every CISO should leverage to help their organization successively defeat sophisticated phishing campaigns By George Viegas Jun 22, 2016 4 mins Data Breach Technology Industry Social Engineering opinion 10 reasons for CSOs to be thankful By George Viegas Nov 25, 2015 3 mins Data and Information Security IT Leadership tip Holiday messaging tips for the security team Early November is a good time to send out pre-holiday security messaging to the whole company By George Viegas Nov 11, 2015 2 mins Social Engineering IT Skills how-to The incident response plan you never knew you had Five strategies to give your incident response plan a headstart by using key components of the existing business continuity plan (BCP). By George Viegas Aug 27, 2015 5 mins Data Breach Disaster Recovery Business Continuity Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe