System and Method for Management of Vulnerability Assessment
First Claim
1. An apparatus, comprising:
- a network interface operable to;
receive application data;
receive assessment information from an assessor related to an assessment of the application, the assessment indentifying at least one vulnerability;
receive one or more remediation tasks associated with the assessment, the one or more remediation tasks designed to remedy the at least one vulnerability;
receive an indication of performance of a remediation task of the one or more remediation tasks;
receive an indication of whether the remediation task remedied the at least one vulnerability;
communicate the information regarding the assessment to a remediator; and
communicate an indication that a remediation task has been completed based at least in part on the indication of performance of the remediation task; and
a processor coupled to the network interface, the processor operable to determine that an application is in scope for vulnerability assessment based at least in part on the application data.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for an optimization of fulfillment workflow is disclosed. In accordance with embodiments of the present disclosure, a method may include: (i) receiving application data; (ii) determining that an application in scope for vulnerability assessment based at least in part on the application data; (iii) receiving assessment information from an assessor related to an assessment of the application, the assessment indentifying at least one vulnerability; (iv) communicating the information regarding the assessment to a remediator; (v) receiving one or more remediation tasks associated with the assessment, the one or more remediation tasks designed to remedy the at least one vulnerability; (vi) receiving an indication of performance of a remediation task of the one or more remediation tasks; (vii) communicating an indication that a remediation task has been completed based at least in part on the indication of performance of the remediation task; and (viii) receiving an indication of whether the remediation task remedied the at least one vulnerability.
29 Citations
15 Claims
-
1. An apparatus, comprising:
-
a network interface operable to; receive application data; receive assessment information from an assessor related to an assessment of the application, the assessment indentifying at least one vulnerability; receive one or more remediation tasks associated with the assessment, the one or more remediation tasks designed to remedy the at least one vulnerability; receive an indication of performance of a remediation task of the one or more remediation tasks; receive an indication of whether the remediation task remedied the at least one vulnerability; communicate the information regarding the assessment to a remediator; and communicate an indication that a remediation task has been completed based at least in part on the indication of performance of the remediation task; and a processor coupled to the network interface, the processor operable to determine that an application is in scope for vulnerability assessment based at least in part on the application data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A tangible computer readable medium comprising logic, the logic operable, when executed on a processor, to:
-
receive application data; determine that an application in scope for vulnerability assessment based at least in part on the application data; receive assessment information from an assessor related to an assessment of the application, the assessment indentifying at least one vulnerability; communicate the information regarding the assessment to a remediator; receive one or more remediation tasks associated with the assessment, the one or more remediation tasks designed to remedy the at least one vulnerability; receive an indication of performance of a remediation task of the one or more remediation tasks; communicate an indication that a remediation task has been completed based at least in part on the indication of performance of the remediation task; and receive an indication of whether the remediation task remedied the at least one vulnerability. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A method, comprising:
-
receiving application data; determining that an application in scope for vulnerability assessment based at least in part on the application data; receiving assessment information from an assessor related to an assessment of the application, the assessment indentifying at least one vulnerability; communicating the information regarding the assessment to a remediator; receiving one or more remediation tasks associated with the assessment, the one or more remediation tasks designed to remedy the at least one vulnerability; receiving an indication of performance of a remediation task of the one or more remediation tasks; communicating an indication that a remediation task has been completed based at least in part on the indication of performance of the remediation task; and receiving an indication of whether the remediation task remedied the at least one vulnerability. - View Dependent Claims (12, 13, 14, 15)
-
Specification