||Risk Assessments: Service providers and network operators should have assigned risk ratings for vulnerabilities and definitions of those risk ratings (i.e. What does a High risk vulnerability mean to the general user public?, etc.) Finally the security team should have access to an accurate and readily available asset inventory (See Step 1: Asset Inventory) (including the asset owners, and patch levels) and network diagrams.
||Cable; Internet/Data; Wireless; Wireline
||Service Provider; Network Operator
||Cyber Security;Intrusion Detection;
||Sans Institute, "Vulnerability Management: Tools, Challenges and Best Practices." 2003. Pg. 8 - 10.