×

System and method for management of vulnerability assessment

  • US 8,590,047 B2
  • Filed: 01/04/2011
  • Issued: 11/19/2013
  • Est. Priority Date: 01/04/2011
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus, comprising:

  • a network interface configured to;

    receive application data;

    provide access to at least a portion of the application data via a business-to-business network connection by a third party;

    a processor coupled to the network interface, the processor configured to;

    calculate a risk score based on one or more parameters received in the application data; and

    determine that the application is in scope for vulnerability assessment based at least in part on the risk score calculated based on the one or more parameters received in the application data, the one or more parameters comprising at least the sensitivity of data associated with the application and whether the application is accessible via the business-to-business network connection by the third party;

    in response to determining that the application is in scope for vulnerability assessment based at least in part on risk score calculated based on the one or more parameters comprising at least the sensitivity of data associated with the application and whether the application is accessible via the business-to-business network connection by the third party, the network interface further configured to;

    receive assessment information from an assessor related to an assessment of the application, the assessment identifying at least one vulnerability;

    receive a remediation plan comprising one or more remediation tasks associated with the assessment from a remediator, the one or more remediation tasks designed to remedy the at least one vulnerability;

    in response to receiving the remediation plan, generate an interactive display to facilitate remediation of the at least one vulnerability;

    receive, via the interactive display generated to facilitate the remediation of the at least one vulnerability, an indication of performance of a remediation task of the one or more remediation tasks;

    receive an indication of whether the remediation task remedied the at least one vulnerability;

    communicate the information regarding the assessment to a remediator; and

    communicate an indication that the remediation task has been completed based at least in part on the indication of performance of the remediation task.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×