Office of the Chief Information Officer

United States Department of Agriculture

Departmental Manual 3530-001

CHAPTER 6, PART 1

VULNERABILITY SCAN PROCEDURES

1 BACKGROUND

Global network connectivity is commonplace for information exchange and is crucial for conducting many everyday operations.  However, the benefits can be overshadowed by the increase in network vulnerabilities.  The number of Information Technology (IT) related incidents that have occurred in the past year, along with the increase and complexity of threats, requires that USDA take their security protection measures seriously.  Networks and information technology resources are continually vulnerable to illegal/ malicious activity or exploitation by internal and external sources.

Vulnerability Scan Procedures are a critical component of the Overall Security Protection Plan within the Department.  Regular IT inventories and vulnerability scans have proven to be an effective tool in combating IT incidents and exploits of USDA information assets.  The purpose of this document is to establish the policy and procedures for the inventory and vulnerability scans of all USDA managed networks, systems, and servers. 

Downloads: 
AttachmentSize
PDF icon PDF version of DM3530-0014.04 MB
HTML icon HTML version of DM3530-001458.98 KB