<section title="6.2. Vulnerability Analysis"><subsection title="Objective"><paragraph
    title="6.2.1."


><![CDATA[<p>Exploitable information system weaknesses can be identified by vulnerability analyses and inform assessments and controls selection.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="6.2.2."


><![CDATA[<p>This section covers information on conducting vulnerability assessments on systems as part of the suite of good IT governance activities.</p>]]></paragraph>
</block>
<block title="Changes as a result of a vulnerability analysis"><paragraph
    title="6.2.3."


><![CDATA[<p>It is important that normal change management processes are followed where changes are necessary in order to address security risks identified in a vulnerability analysis.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Rationale &amp; Controls"> <block title="Vulnerability analysis strategy"><paragraph
    title="6.2.4.R.01."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>Vulnerabilities may be unintentionally introduced and new vulnerabilities are constantly identified, presenting ongoing risks to information systems security.</p>]]></paragraph>
<paragraph
    title="6.2.4.R.02."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>While agencies are encouraged to monitor the public domain for information related to vulnerabilities that could affect their systems, they should not remain complacent if no specific vulnerabilities relating to deployed products are disclosed.</p>]]></paragraph>
<paragraph
    title="6.2.4.R.03."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>In some cases, vulnerabilities can be introduced as a result of poor information security practices or as an unintended consequence of activities within an agency. As such, even if no new public domain vulnerabilities in deployed products have been disclosed, there is still value to be gained from regular vulnerability analysis activities.</p>]]></paragraph>
<paragraph
    title="6.2.4.R.04."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>Furthermore, monitoring vulnerabilities, conducting analysis and being aware of industry and product changes and advances, including NZISM requirements, provides an awareness of other changes which may adversely impact the security risk profile of the agency’s systems.</p>]]></paragraph>
<paragraph
    title="6.2.4.C.01."

    tags="Governance,Vulnerability Analysis"


    classification="All Classifications"
    compliance="Should"
    cid="1063"
><![CDATA[<p>Agencies SHOULD implement a vulnerability analysis strategy by:</p><ul>
<li>monitoring public domain information about new vulnerabilities in operating systems and application software;</li>
<li>considering the use of automated tools to perform vulnerability assessments on systems in a controlled manner;</li>
<li>running manual checks against system configurations to ensure that only allowed services are active and that disallowed services are prevented; </li>
<li>using security checklists for operating systems and common applications; and</li>
<li>examining any significant incidents on the agency’s systems.</li>
</ul>]]></paragraph>
</block>
<block title="Conducting vulnerability assessments"><paragraph
    title="6.2.5.R.01."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>A baseline or known point of origin is the basis of any comparison and allows measurement of changes and improvements when further information security monitoring activities are conducted.</p>]]></paragraph>
<paragraph
    title="6.2.5.C.01."

    tags="Governance,Vulnerability Analysis"


    classification="All Classifications"
    compliance="Should"
    cid="1066"
><![CDATA[<p>Agencies SHOULD conduct vulnerability assessments in order to establish a baseline. This SHOULD be done:</p><ul>
<li>before a system is first used;</li>
<li>after any significant incident;</li>
<li>after a significant change to the system;</li>
<li>after changes to standards, policies and guidelines; </li>
<li>when specified by an ITSM or system owner.</li>
</ul>]]></paragraph>
</block>
<block title="Resolving vulnerabilities"><paragraph
    title="6.2.6.R.01."

    tags="Governance,Vulnerability Analysis"


><![CDATA[<p>Vulnerabilities may occur as a result of poorly designed or implemented information security practices, accidental activities or malicious activities, and not just as the result of a technical issue.</p>]]></paragraph>
<paragraph
    title="6.2.6.C.01."

    tags="Governance,Vulnerability Analysis"


    classification="All Classifications"
    compliance="Should"
    cid="1069"
><![CDATA[<p>Agencies SHOULD analyse and treat all vulnerabilities and subsequent security risks to their systems identified during a vulnerability assessment.</p>]]></paragraph>
</block>
</subsection>
</section>
