
Vulnerability Response and Remediation (Part 2) (Domain 4)
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
-
Narrado por:
-
De:
Acerca de esta escucha
Not all vulnerabilities can be patched right away, and in these cases, compensating controls, segmentation, and exceptions become essential components of a realistic remediation strategy. In this episode, we discuss how organizations can use host firewalls, access control lists, and network isolation to contain vulnerable systems while planning for a longer-term fix. We also explore how to formally document and justify exceptions when remediation is deferred—something often required for compliance audits. These exceptions should include timelines, risk assessments, and mitigating measures to prevent exploitation during the interim period. The conversation includes a look at intrusion prevention systems (IPS), protocol filtering, and behavioral restrictions as layered defenses that reduce exposure. When full remediation isn’t immediately possible, mitigation steps must still lower the likelihood of compromise. Security is rarely perfect, but it must always be intentional.