Vulnerability Management
To prevent security incidents, NTT Data utilizes corporate vulnerability management agents that are continuously monitored by the corporate security team. This proactive approach enables the identification and mitigation of risks before they evolve into real threats.
In addition, Syntphony undergoes periodic security audits—annually—carried out by a specialized ethical hacking team. These audits evaluate the infrastructure and Baseline, based on recognized industry standards such as OWASP, OSINT, OSSTMM, and T-REC-X.509.
Vulnerability management encompasses not only identifying system flaws but also prioritizing them based on the risks they pose. A continuous cycle of discovery, assessment, and remediation is implemented, which includes:
Identification: Use of automated and manual tools to detect vulnerabilities across systems, applications, and networks.
Classification: Evaluation of each vulnerability’s severity using criteria such as the Common Vulnerability Scoring System (CVSS).
Remediation: Application of patches or configuration changes to mitigate identified vulnerabilities.
Verification: Testing to ensure that vulnerabilities have been effectively mitigated.
Reporting & Tracking: Documenting and communicating findings to management and stakeholders, maintaining a clear security status record.
This comprehensive approach not only strengthens NTT Data’s infrastructure security but also fosters a security-oriented organizational culture where all employees are aware of the importance of vulnerability management.
Last updated
Was this helpful?