WikiGlossaryVulnerability Scanning
Security

Vulnerability Scanning

Definition

Vulnerability scanning is the systematic process of using automated techniques to identify known security weaknesses (vulnerabilities) across systems, applications, networks, and cloud resources. In ISO/IEC 27001 programs, vulnerability scanning is a key input to risk assessment and risk treatment, helping organizations discover technical exposures and track remediation as part of ongoing security operations. It directly supports Annex A control 8.8 (Management of technical vulnerabilities) by enabling organizations to: maintain awareness of vulnerabilities that affect their assets, assess potential impact and likelihood, prioritize fixes based on risk, and verify that remediation actions (such as patching, configuration hardening, or compensating controls) are effective. Scans can be internal or external, authenticated (credentialed) or unauthenticated, and performed on a schedule or continuously, depending on risk and operational needs. Results typically include vulnerability severity, affected assets, evidence, and recommended mitigations, but require triage to remove false positives and focus on the highest-risk findings. Equivalent practices appear in other security frameworks as continuous vulnerability management and ongoing monitoring requirements (for example, NIST SP 800-53 RA-5 and the CIS Controls approach to continuous vulnerability management), often paired with patch management, secure configuration baselines, and incident response readiness.

Real-World Examples

Startup cloud exposure scan

A startup runs weekly external scans of public IPs and cloud services to find misconfigurations and outdated components before product releases.

Enterprise authenticated endpoint scanning

An enterprise performs monthly credentialed scans on servers and workstations to identify missing patches and insecure configurations, then validates fixes with re-scans.

Risk-based remediation workflow

A security team correlates scan findings with asset criticality and exploitability to prioritize remediation tickets and track closure SLAs for high-risk issues.

CI/CD and container image scanning

A scale-up scans container images and dependencies during build to block deployments with critical vulnerabilities and reduce recurring findings in production.

Vulnerability scanning is an automated process that checks systems and applications for known weaknesses, then reports findings so they can be prioritized and fixed.

Scanning tools discover assets, test them against vulnerability signatures and configuration checks, and produce results with evidence, severity, and remediation guidance.

Scanning finds potential weaknesses; vulnerability management is the end-to-end program to triage, prioritize, remediate, verify fixes, and report risk over time.

Scanning identifies known issues broadly and repeatedly, while penetration testing is a deeper, time-boxed exercise that attempts to exploit weaknesses to validate impact.

Frequency should be risk-based, commonly weekly or monthly for critical assets, plus after major changes, new deployments, and emerging high-risk vulnerabilities.

An authenticated scan uses approved credentials to assess internal patch levels and configurations more accurately, typically reducing blind spots compared to unauthenticated scans.

External scans test what an attacker can see from the internet, while internal scans evaluate vulnerabilities inside the network or environment where more services are reachable.

Include internet-facing systems, servers, endpoints, network devices, cloud resources, applications, containers, and critical third-party services that process or store sensitive data.

Prioritize by severity, exploitability, asset criticality, and exposure, then remediate via patching or hardening, document exceptions, and re-scan to confirm closure.

Use credentialed scans where appropriate, maintain accurate asset inventories, tune scan policies, validate results with evidence, and keep scanning engines and signatures updated.

VersionDateAuthorDescription
1.0.02026-02-26WatchDog Security GRC Wiki TeamInitial publication