About
Software vulnerabilities and a lack of patching IT assets are among the leading causes of data breaches. To help prevent breaches, it’s critical to have an effective vulnerability management program. Princeton’s risk-based program includes the identification, classification, remediation, and migration of vulnerabilities in our IT environment. To learn more, visit the knowledge base articles referenced below.
Knowledge Articles
-
-
View article KB0013949 to learn about the Office of Information Technology's services and tools for managing vulnerabilities, such as infrastructure vulnerability scanning and assessments, and web application and API scanning.
-
-
View article KB0014335 to learn how this module provides integration with our vulnerability detection scanning engine. With this integration, ServiceNow automatically matches assets upon which vulnerabilities have been detected to the Configuration Item (CI) in the ServiceNow Configuration Management Database (CMDB), and auto-assigns vulnerabilities to Remediation Owners based on the support group(s) defined in the CI.
This article also explains Princeton's vulnerability remediation requirements.
Questions?
For questions about the Vulnerability Management Program, please contact [email protected].
Training
View the video training guide to learn about the ServiceNow Vulnerability Response Module.