Vulnerability assessment (new) VUAS


Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact.

Guidance notes


Activities may include - but are not limited to...

  • cataloguing and classifying information and technology resources (assets and capabilities) to support vulnerability assessment
  • assigning quantifiable value, a rank order and importance to information and technology resources
  • identifying and analysing the vulnerabilities of each resource – manually or using automated tools and information sources
  • prioritizing, scoring ranking the risk associated with vulnerabilities
  • business impact assessment
  • mitigating or eliminating the vulnerabilities

Vulnerability assessment tools include web application scanners, protocol scanners, network scanners.

Vulnerability assessment (new): Level 5


Plans and manages vulnerability assessment activities within the organisation.

Evaluates and selects, reviews vulnerability assessment tools and techniques.

Obtains and acts on vulnerability information and conducts security risk assessments, business impact analysis and accreditation on complex information systems.

Vulnerability assessment (new): Level 4


Collates and analyses catalogues of information and technology assets for vulnerability assessment. Performs vulnerability assessments, and business impact analysis for medium complexity information systems. Contributes to selection and deployment of vulnerability assessment tools and techniques.

Vulnerability assessment (new): Level 3


Performs basic vulnerability assessments for small information systems. Communicates information security risks and issues to business managers and others. Supports creation of catalogues of information and technology assets for vulnerability assessment.

Undertakes moderate-complexity vulnerability assessments using more sophisticated techniques and tools.

Vulnerability assessment (new): Level 2


Undertakes low-complexity routine vulnerability assessments using automated and semi-automated tools. Escalates issues where appropriate.

Contributes to documenting the scope and evaluating the results of vulnerability assessments.