Are your systems and applications scanned with an authenticated user account for vulnerabilities (that are remediated) prior to new releases?
Explanation
Example Responses
Example Response 1
Yes, we perform authenticated vulnerability scanning on all systems and applications prior to new releases Our DevSecOps pipeline includes mandatory authenticated scans using Tenable.io and OWASP ZAP with dedicated scanning accounts that have standard user permissions Critical and high vulnerabilities must be remediated before release approval, while medium vulnerabilities require remediation within 30 days post-release Low vulnerabilities are tracked but remediated based on resource availability Our Security team reviews all scan results, and our Change Advisory Board requires clean scan results (or approved exceptions with compensating controls) before authorizing production deployment We maintain scan reports for all releases for at least 12 months.
Example Response 2
Yes, our organization conducts authenticated vulnerability scanning as part of our release management process We use a combination of Qualys for infrastructure scanning and Veracode for application scanning, both configured with dedicated service accounts that have appropriate access levels Our CI/CD pipeline automatically triggers these scans during the QA phase, and our release policy mandates that all critical and high vulnerabilities must be remediated before proceeding to production Medium vulnerabilities require documented risk acceptance from the application owner and CISO if not addressed pre-release We also perform quarterly authenticated scans on production environments to ensure ongoing security posture All scan results are documented in our vulnerability management system and tracked to resolution.
Example Response 3
No, we currently do not perform authenticated vulnerability scanning prior to new releases Our security testing process primarily relies on unauthenticated scanning using Nessus, which we recognize provides limited visibility into potential vulnerabilities We are in the process of implementing a more comprehensive vulnerability management program that will include authenticated scanning capabilities Our roadmap includes deploying Rapid7 InsightVM within the next quarter and updating our release management procedures to require authenticated scans with remediation of critical findings before release approval In the interim, we mitigate this gap through manual security code reviews for critical applications and third-party penetration testing on an annual basis.
Context
- Tab
- Infrastructure
- Category
- Vulnerability Management

