CISA KEV Vulnerability

Resource Downloads

Google Slides | Microsoft PowerPoint | PDF Presentation

Injection

You learn that you have an internet facing machine with a vulnerability on the CISA KEV list.

Discussion Prompts

  1. How do you determine if this is a confirmed security incident or some kind of anomaly?
    • How do you identify what systems, data, people, and operational processes are potentially involved?
    • What real or potential risk(s) does your organization face?
  2. What short term containment options do you have?
    • Can you contain it without destroying evidence?
    • What is the operational impact of the incident and your containment strategy?

Check Your Work