Use Case - Regularly scan for known security vulnerabilities
- Author: Sanni Rummakko
- Date / Version: 1.0
User roles
- Security person: Responsible for initiating and managing security scans.
Prerequisites / Conditions
- Tukko's systems are accessible for scanning.
- Appropriate tools are defined in the security check tool.
Description of use case -eg. Modify existing request
- Security person initiates a security scan for known vulnerabilities in Tukko's systems.
- The security scanning tool scans Tukko's systems for known security vulnerabilities.
- Produce a report detailing the vulnerabilities identified, including their severity, descriptions and potential impact.
- Security person reviews the scan results to prioritize vulnerabilities for remediation based on severity and potential impact on Tukko's security posture.
- If necessary, the security person develops a remediation plan to address identified vulnerabilities.
Exceptions
-
E1: The security scanning tool encounters technical issues or errors during the scan process, preventing it from completing successfully.
-
E2: The scan results are incomplete or inaccurate due to unexpected factors, such as network interruptions or false positives.
Result
- The expected outcome of a use case is a full report detailing the vulnerabilities identified, allowing the security person to prioritise and address them effectively.
Use frequency
- The use case is executed regularly, typically on a scheduled basis, to ensure continuous monitoring and mitigation of security risks in Tukko's systems.
Additional information
-
It is essential to review and update the scanning process regularly to adapt to changing security threats and technology landscapes.
-
The security scanning tool's configurations, such as scan schedules and target systems, should be documented and maintained for consistency and repeatability.
Sources
This wiki-document is based on the The public administration recommendations
Thans to the original authors.