Vulnerability assessment definition

Vulnerability assessment means an assessment of the
Vulnerability assessment has the meaning set forth in Schedule V.
Vulnerability assessment means an assessment of the vulnerability of a public water system to a terrorist attack or other intentional acts intended to substantially dis- rupt the ability of the public water system to provide a safe and reliable supply of drinking water as required by the Public Health Security and Bioterrorism Preparedness and Response Act of 2002, Pub.L. No. 107-188.

Examples of Vulnerability assessment in a sentence

  • Task Deliverables Memorandum #1: Vulnerability assessment of existing EV charging infrastructure Memorandum #2: Risk analysis of the Monterey Bay Area EV charging infrastructure ecosystem Task 3: Traditional Public Outreach The technical consultant and project partners will host public workshops and conduct community engagement activities to inform the creation of the framework.


More Definitions of Vulnerability assessment

Vulnerability assessment means an assessment that
Vulnerability assessment means the process of iden-
Vulnerability assessment means an assessment of the vulnerability of a public water system to a terrorist attack or other
Vulnerability assessment means an assessment of the vulnerability of a public water system to a terrorist attack or other intentional acts intended to substantially disrupt the ability of the
Vulnerability assessment. 1 means a systematic examination of an IT system, and its controls and processes, to determine the adequacy of security measures, identify security deficiencies, provide data from which to predict the effectiveness of proposed security measures and confirm the adequacy of such measures after implementation; and;
Vulnerability assessment. SailPoint shall regularly conduct risk assessments, vulnerability scans and audits (including third-party penetration testing of the SaaS Services twice annually and Software upon each new version release). Identified product solution issues shall be scored using the Common Vulnerability Scoring System (CVSS) risk-scoring methodology based on risk impact level and the likelihood and potential consequences of an issue occurring. Vulnerabilities are remediated on the basis of assessed risk. Upon request from Customer, SailPoint shall provide information about the identified vulnerabilities and the measures taken to remediate or address any such vulnerabilities. Operational SecurityAccess controls: SailPoint shall maintain policies, procedures, and logical controls to establish access authorisations for employees and third parties to limit access to properly authorised personnel and to prevent unauthorised access. Such controls shall include: o requiring unique user IDs to identify any user who accesses systems or data; o managing privileged access credentials in a privileged account management (XXX) system; o communicating passwords separately from user IDs; o ensuring that user passwords are (1) changed at regular intervals; (2) of sufficient length and complexity;
Vulnerability assessment. SailPoint shall regularly conduct risk assessments, vulnerability scans and audits (including third- party penetration testing of the SaaS services twice annually and Software upon each new version release). Identified product solution issues shall be scored using the Common Vulnerability Scoring System (CVSS) risk-scoring methodology based on risk impact level and the likelihood and potential consequences of an issue occurring. Vulnerabilities are remediated on the basis of assessed risk. Upon request from Customer, SailPoint shall provide information about the identified vulnerabilities and the measures taken to remediate or address any such vulnerabilities. Operational SecurityAccess controls: SailPoint shall maintain policies, procedures, and logical controls to establish access authorisations for employees and third parties to limit access to properly authorised personnel and to prevent unauthorised access. Such controls shall include: o requiring unique user IDs to identify any user who accesses systems or data; o managing privileged access credentials in a privileged account management (XXX) system; o communicating passwords separately from user IDs; o ensuring that user passwords are (1) changed at regular intervals; (2) of sufficient length and complexity; (3) stored in an encrypted format; (4) subject to reuse limitations; and (5) not assigned to other users, even at a different time; and o automatically locking out users’ IDs when a number of erroneous passwords have been entered. • Least privilege: SailPoint shall ensure that personnel only have access to systems and data as required for the performance of their roles; only authorised personnel have physical access to infrastructure and equipment; access to production resources for the SaaS services is restricted to employees requiring access; and access rights are reviewed and certified at least annually to ensure access is appropriate. • Malware: SailPoint shall utilise industry-standard measures to detect and remediate malware, viruses, ransomware, spyware, and other intentionally harmful programs that may be used to gain unauthorised access to information or systems.