How to Fix Host Vulnerabilities?
I. Assessment of Impact
Before fixing vulnerabilities, the impact of the fix should be assessed and a repair plan should be developed.
It is recommended to prioritize the repair of “high-risk” vulnerabilities and then fix “medium-risk” and “low-risk” vulnerabilities according to business conditions;
Before fixing the vulnerabilities, the assets affected should be identified first, at least the following information should be included:
- The operating environment of the target host system
- The dependent program components of the business system on the target host
- The repair personnel should develop a repair plan based on the above two items, test and demonstrate the feasibility of the repair plan;
II. Preparation for Repair
In order to prevent problems caused by repair leading to business interruption, it is recommended to prepare a test environment and backup:
Repair personnel should test vulnerability repair in a simulated test environment identical to the target host to confirm the compatibility and security of the repair plan;
Before implementing the repair, the repair personnel should prepare data backups (for example, perform system snapshots of the target host) to be able to restore in time in case of an accident.
III. Online Repair
Repair personnel should repair according to the vulnerability list one by one, and should proceed to the next after each repair is confirmed to be correct;
Repair personnel should record the repair process promptly, and form a vulnerability repair implementation report after the repair is completed, and archive related documents on time.