Vulnerability Scan

Scan and categorizes security threats, mapping those to policies to see what the mitigation should be.

EOTSS End User and IT Service Support

Phone

Support for Commonwealth end users and IT support personnel

Online

The Details

Features

A vulnerability scan is an automated high-level test that looks for potential security vulnerabilities. Vulnerability Scan v. Penetration Testing: A vulnerability scan only identifies vulnerabilities, while a penetration tester digs deeper to identify the root cause of the vulnerability that allows access to secure systems or stored sensitive data. A Designated Security Officer (DSO) must submit the Penetration Testing Services. If you are a DSO, click here to request Penetration Testing. You may also request to include IPs, adding a specific IP or IP ranges into the Monthly/Weekly scan rotation due to a new environment being built, a new server being stood up or a migration to a new location. If you would like to Exclude IPs from the Monthly/Weekly scan due to issues such as service interruptions, please submit a Vulnerability Remediation Exception Request. For more information on Commonwealth Cybersecurity, please visit our Cybersecurity and Enterprise Risk Management site on mass.gov.

How to request

Service Level Expectation (SLE)

Vulnerability Scan

SLEResponsibilities/Dependencies

Fulfillment: 99% within 2 months  

Customer

  • Responsible for adhering to the EOTSS Standard Rules of Engagement.
  • SLE being met is dependent on the following customer responsibilities: 
    • Total remediation time
    • Customer responsiveness throughout the process
    • Total number of assessments requested until a clean scan is achieved

EOTSS

  • Responsible for working with the customer during testing/remediation to achieve a clean scan. 

Policies

Contact

Phone

Support for Commonwealth end users and IT support personnel

Online

Help Us Improve Mass.gov  with your feedback

Please do not include personal or contact information.
Feedback