The global skills and competency framework for the digital world

Vulnerability assessment VUAS

Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact.

Guidance notes

Activities may include — but are not limited to:

  • cataloguing and classifying information and technology resources (assets and capabilities) to support vulnerability assessment
  • assigning quantifiable value, rank order and importance to information and technology resources
  • identifying and analysing the vulnerabilities of each resource — manually or using automated tools and information sources
  • prioritising, scoring and ranking the risk associated with vulnerabilities
  • business impact assessment
  • mitigating or eliminating the vulnerabilities.

Vulnerability assessment tools include web application scanners, protocol scanners and network scanners.


Defined at these levels: 2 3 4 5

Vulnerability assessment: Level 1

This skill is not typically observed or practiced at this level of responsibility and accountability.

Vulnerability assessment: Level 2

Undertakes low-complexity routine vulnerability assessments using automated and semi-automated tools.

Escalates issues where appropriate.

Contributes to documenting the scope and evaluating the results of vulnerability assessments.

Vulnerability assessment: Level 3

Follows standard approaches to performs basic vulnerability assessments for small information systems.

Supports creation of catalogues of information and technology assets for vulnerability assessment.

Vulnerability assessment: Level 4

Collates and analyses catalogues of information and technology assets for vulnerability assessment.

Performs vulnerability assessments and business impact analysis for medium complexity information systems.

Contributes to selection and deployment of vulnerability assessment tools and techniques.

Vulnerability assessment: Level 5

Plans and manages vulnerability assessment activities within the organisation.

Evaluates and selects, reviews vulnerability assessment tools and techniques.

Provides expert advice and guidance to support the adoption of agreed approaches.

Obtains and acts on vulnerability information and conducts security risk assessments, business impact analysis and accreditation on complex information systems.

Vulnerability assessment: Levels 6-7

This skill is not typically observed or practiced at these levels of responsibility and accountability.