Mapping remediation to plurality of vulnerabilities
First Claim
1. A method of mapping a remediation to a plurality of vulnerabilities, the method comprising:
- assessing susceptibility of an non-remediated machine to a first vulnerability, which results in a first set of two or more vulnerabilities to which the machine is susceptible;
implementing the remediation upon the machine;
assessing susceptibility of the remediated machine to the first vulnerability, which results in a second set of vulnerabilities to which the machine is susceptible; and
creating a machine-actionable map between the remediation and two or more members of the first set based upon differences between the first and second sets.
4 Assignments
0 Petitions
Accused Products
Abstract
A method of mapping a remediation to a plurality of vulnerabilities may include: assessing susceptibility of an non-remediated machine to a first vulnerability, which results in a first set of two or more vulnerabilities to which the machine is susceptible; implementing the remediation upon the machine; assessing susceptibility of the remediated machine to the first vulnerability, which results in a second set of vulnerabilities to which the machine is susceptible; and creating a machine-actionable map between the remediation and two or more members of the first set based upon differences between the first and second sets.
44 Citations
16 Claims
-
1. A method of mapping a remediation to a plurality of vulnerabilities, the method comprising:
-
assessing susceptibility of an non-remediated machine to a first vulnerability, which results in a first set of two or more vulnerabilities to which the machine is susceptible;
implementing the remediation upon the machine;
assessing susceptibility of the remediated machine to the first vulnerability, which results in a second set of vulnerabilities to which the machine is susceptible; and
creating a machine-actionable map between the remediation and two or more members of the first set based upon differences between the first and second sets. - View Dependent Claims (2, 3, 5, 11, 12, 13, 15)
-
-
4. The method of claim 19, wherein:
-
the residual set is a first residual set; and
the verifying includes;
eliminating members of the third set that are also members of the fourth set to produce a second residual set; and
confirming that none of the members of the second residual set are members of the first residual set. - View Dependent Claims (14)
-
-
6. A machine-readable medium comprising instructions, execution of which by a machine maps a remediation to a plurality of vulnerabilities, the machine-readable instructions including:
-
a first code segment to assess susceptibility of an non-remediated machine to a first vulnerability, which results in a first set of two or more vulnerabilities to which the machine is susceptible;
a second code segment to implement the remediation upon the machine;
a third code segment to assess susceptibility of the remediated machine to the first vulnerability, which results in a second set of vulnerabilities to which the machine is susceptible; and
a fourth code segment to create a machine-actionable map between the remediation and two or more members of the first set based upon differences between the first and second sets. - View Dependent Claims (7, 8, 9, 10)
-
-
16. An apparatus for mapping a remediation to a plurality of vulnerabilities, the apparatus comprising:
-
means for assessing susceptibility of an non-remediated machine to a first vulnerability, which results in a first set of two or more vulnerabilities to which the machine is susceptible;
means for implementing the remediation upon the machine;
means for assessing susceptibility of the remediated machine to the first vulnerability, which results in a second set of vulnerabilities to which the machine is susceptible; and
means for creating a machine-actionable map between the remediation and two or more members of the first set based upon differences between the first and second sets.
-
Specification