You are here

Vulnerability Assessments

Our information security vulnerability assessment program consists of policies, procedures, tools and services intended to assist business units in identifying and remediation of security vulnerabilities in servers, workstations, other devices, and web applications.

Vulnerability assessments are required for sensitive systems and all Internet accessible web applications before they are implemented, annually thereafter, and whenever significant changes are made.

System administrators and system owners may request a vulnerability assessment by sending email to the IT Security Office and requesting the service.  After the request is received, the requestor will be contacted to discuss the process and to schedule the necessary scans at a mutually agreeable time.