To conduct a successful vulnerability scan, you need to schedule it during the time when it will impact the operations the least. Ideally you should scan once a month, but if your network infrastructure is highly dynamic, you may need to do it weekly. Scans can be done in multiple ways. They can be done internally or externally and it can be credentialed or not credentialed. They can also be agent or agentless and be passive or active. They can also be static or dynamic and can also be done in segments.
Internal scans are simply conducted within a company’s network while an external scan is done outside of the company’s network. External is done to ensure there are no ways for a hacker to get into the network by scanning from the outside. Internal scans all the devices from within the network with privilege to thoroughly identify all the vulnerabilities.
Agent is when you have a software installed on individual machines that sends back information to a central point while agentless requires the requests. Agent based is better but more resource intensive. Agentless is more ideal for a more dynamic and bigger network. Credentialed is also known as authenticated scan while non credentialed is known as non authenticated scans. As the name states, authenticated scan is more through and requires login for privileged access for deeper scanning. Unauthenticated doesn’t use credentials and rely on external information and probes to identify vulnerabilities. Authenticated scans help comply with security standards and regulations like PCI DSS or HIPPA while unauthenticated scans don’t. Unauthenticated scans are good for quick scans to mimic how an attacker would usually try to scan.
It’s critical to have a great baseline in a dynamic environment. Security baselines assessment helps you to continuously monitor organization’s security baselines compliance and identify changes more effectively.