Steps for Implementing Vulnerability Management - PAS ICS Integrity - 7.3 - Help - Intergraph

ICS Integrity Help

Language
English
Product
PAS ICS Integrity
Subproduct
ICS
Search by Category
Help
PAS Version
7.3

The following list provides the steps to configure ICS Integrity to enable the vulnerability management features. This list guides you through the sections of this document related to these configuration tasks.

  1. To implement vulnerability management for your IT assets, set up the Recon asset model and define one or more data owners for the Recon data. For more information, see the Recon Implementation Guide.

  2. Configure ICS Integrity to get the latest patch information on a scheduled basis and ensure updates are succeeding. This process imports the latest PAS Patch Management asset model as scheduled. For more information, see Steps for Implementing Patch Management.

  3. Configure ICS Integrity to get the latest vulnerability information on a scheduled basis. This process imports the latest PAS Vulnerability Management asset model as scheduled. For more information, see Automating Vulnerability Management Information Updates.

  4. Use the system-wide settings to identify who should be notified when the import of the latest vulnerability and patch information does not occur as expected. For more information, see Vulnerability Management.

  5. Schedule the inventory import to run following each import of data you want in vulnerability matching, such as Recon and TPS data. The inventory import uses the latest data collected by the Recon import and others. For more information, see Scheduling Data Imports.

  6. Make sure the data imports have completed at least once, and then verify vulnerability management information is available in ICS Integrity. For more information, see Verifying Vulnerability Management Information.

  7. Define the workflow and checklists for vulnerability management. Then, specify the settings to connect the workflow to the Investigate button. For more information, see Configuring a Vulnerability Management Workflow.

After you have implemented vulnerability management, users can use the windows and workflows to assess and remediate or mitigate potential issues.

For more information about using the vulnerability management features, see Understanding Vulnerability Management.