2023-04-11 NOTICE: The following policy or plan is currently under internal review and may not be up-to-date or fully aligned with our organization's current practices or procedures. Please check back shortly, or contact us for more information.
Vulnerability Scanning Policy
Versionista is proactive about information security and understands that
vulnerabilities need to be monitored on an ongoing basis. Versionista utilizes
Nessus Scanner from Tenable to
consistently scan, identify, and address vulnerabilities on our systems. We also
utilize OSSEC on all systems, including logs, for file
integrity checking and intrusion detection.
Applicable Standards
Applicable Standards from the HITRUST Common Security Framework
- 10.m - Control of Technical Vulnerabilities
Applicable Standards from the HIPAA Security Rule
- 164.308(a)(8) - HIPAA Security Rule Evaluation
Vulnerability Scanning Policy
- Nessus management is performed by the Versionista Security Officer, or an
authorized delegate of the Security Officer.
- Nessus is used to monitor all internal IP addresses (servers, VMs, etc) on
Versionista networks.
- Frequency of scanning is as follows:
- on a weekly basis;
- after every production deployment.
- Reviewing Nessus reports and findings, as well as any further investigation
into discovered vulnerabilities, is the responsibility of the Versionista
Security Officer. The process for reviewing Nessus reports is outlined below:
- The Security Officer initiates the review of a Nessus Report by creating an
Issue in the Versionista Quality Management System.
- The Security Officer, or a Versionista Security Engineer assigned by the
Security Officer, is assigned to review the Nessus Report.
- If new vulnerabilities are found during review, the process outlined below is
used to test those vulnerabilities. Once those steps are completed, the Issue
is then reviewed again.
- Once the review is completed, the Security Officer approves or rejects the
Issue. If the Issue is rejected, it goes back for further review.
- If the review is approved, the Security Officer then marks the Issue as
Done, adding any pertinent notes required.
- In the case of new vulnerabilities, the following steps are taken:
- All new vulnerabilities are verified manually to assure they are repeatable.
Those not found to be repeatable are manually tested after the next
vulnerability scan, regardless of if the specific vulnerability is discovered
again.
- Vulnerabilities that are repeatable manually are documented and reviewed by
the Security Officer and Privacy Officer to see if they are part of the
current risk assessment performed by Versionista.
- Those that are a part of the current risk assessment are checked for
mitigations.
- Those that are not part of the current risk assessment trigger a new risk
assessment, and this process is outlined in detail in the Versionista Risk
Assessment Policy.
- All vulnerability scanning reports are retained for 6 years by Versionista.
Vulnerability report review is monitored on a quarterly basis using the
Quality Management System reporting to assess compliance with above policy.
- Penetration testing is performed regularly as part of the Versionista
vulnerability management policy.
- External penetration testing is performed annually by a third party.
- Internal penetration testing is performed quarterly. Below is the process used
to conduct internal penetration tests.
- The Security Officer initiates the penetration test by creating an Issue in
the Versionista Quality Management System.
- The Security Officer, or a Versionista Security Engineer assigned by the
Security Officer, is assigned to conduct the penetration test.
- Gaps and vulnerabilities identified during penetration testing are
reviewed, with plans for correction and/or mitigation, by the Versionista
Security Officer before the Issue can move to be approved.
- Once the testing is completed, the Security Officer approves or rejects the
Issue. If the Issue is rejected, it goes back for further testing and
review.
- If the Issue is approved, the Security Officer then marks the Issue as
Done, adding any pertinent notes required.
- Penetration tests results are retained for 6 years by Versionista.
- Internal penetration testing is monitored on an annual basis using the Quality
Management System reporting to assess compliance with above policy.
- This vulnerability policy is reviewed on a quarterly basis by the Security
Officer and Privacy Officer.