CompTIA Security + Chapter 5
CompTIA Security + Chapter 5
✓ Scan efficiency:
o Configure specific plug-ins to run based on your
needs.
o Disable unnecessary plug-ins to improve speed and
reduce false positives.
o For example, if you don't use Amazon Linux, disable
related checks.
✓ Intrusive plug-ins:
o Perform tests that might disrupt production systems.
o Balance the need for thorough scans with avoiding
o disruption.
o Consider testing on a separate environment
first before running on production.
Supplementing Network Scans:
✓ Network scans:
o Simulate attacker perspective, but firewalls and
controls might affect results.
o May not confirm vulnerabilities, leading to false
positives.
✓ Supplementing network scans:
o Credentialed scans:
▪ Use credentials to access servers and verify
configurations.
▪ Improves scan accuracy by checking for fixes like
OS updates.
▪ Use least privilege principle with read-only
accounts to minimize risk.
Supplementing Network Scans:
✓ Agent-based scanning:
o Install agents on servers for "inside-out" scans.
o Provides additional vulnerability information.
o Use cautiously due to potential performance or
stability concerns.
▪ Start with a small pilot deployment before wider
use.
Scan Perspectives in Vulnerability
Management:
✓Exploitability = 8.22 * AV * AC * PR * UI
o Attack Vector
o Attack Complexity
o Privileges Required
o User Interaction
Vulnerability Scanner Security: