Vulnerability Management

Vulnerability management is a proactive approach to managing network and computer security. It involves identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities in SDSU systems and software. Vulnerabilities can be a common occurrence and come about due to software flaws, bugs, or insecure system configuration and settings.

What tools and services does the University use for vulnerability tracking?

We use a combination of scanning tools and testing methods. These tools scan our network and systems to find known vulnerabilities.

Qualys Vulnerability Management Platform:

  • Used for vulnerability scanning, web application scanning, and asset management
  • Provides an installable agent to provide up-to-date details on server vulnerabilities without the need to scan.
  • Scans university web applications for known vulnerabilities.
  • University assets are categorized by department, and ranked according to risk.

University of Texas at Austin:

  • The Dorkbot Scanner was created by the Information Security department at UT and is used for web application scanning.
  • This scanning is provided at no cost to SDSU

The Shadowserver Foundation:

  • Shadowserver provides regular vulnerability scanning of internet facing systems.
  • This scanning is provided at no cost to SDSU

Cybersecurity and Infrastructure Security Agency:

  • CISA offers vulnerability scanning services to assist federal agencies and other partners in identifying and mitigating vulnerabilities in their networks.
  • Regularly scans internet-facing systems for vulnerabilities and reports them.
  • This scanning is provided at no cost to SDSU

Cost

Vulnerability Scanning is run on all SDSU servers free of charge.

Get Help

To request a service, create a ServiceNow Ticket and assign the ticket to “IT-ITSO-Help Desk”.

IT Security Office
Administration Building
https://it.sdsu.edu/get-help

Report an Incident

Please contact the Information Security team immediately if you experience or are aware of any of the following: