Letter: Vendors can't solve all vulnerabilities, so use multiple assessment tools
Vulnerability assessment tools such as the Real Secure Internet Security Scanner, Nessus, and The Harris STAT scanner are excellent tools which could be used to evaluate and assess software systems.
What do you think? Paste a comment in the box below (registration required), or send your comment to (subject line: Blog comment) and we'll post it.
Regarding "FAR Council issues final security configuration rule," a reader writes: It is virtually impossible for a vendor to ensure that all computer vulnerabilities are removed. However, the following is a guide which contract officers could use in contracts:
"The contractor shall ensure that all well-known vulnerabilities removed or mitigated prior to system testing and acceptance."
Vulnerability assessment tools such as the Real Secure Internet Security Scanner, Nessus, and The Harris STAT scanner are excellent tools which could be used to evaluate and assess software systems. It is recommend that multiple scanning tools be used since they are on different
production lines and different discovery methods.
Anonymous
letters@fcw.com
"The contractor shall ensure that all well-known vulnerabilities removed or mitigated prior to system testing and acceptance."
Vulnerability assessment tools such as the Real Secure Internet Security Scanner, Nessus, and The Harris STAT scanner are excellent tools which could be used to evaluate and assess software systems. It is recommend that multiple scanning tools be used since they are on different
production lines and different discovery methods.
Anonymous
letters@fcw.com
NEXT STORY: Letter: FISMA improvements right on target