||Vulnerability Assessment Policies: Service providers, network operators, and equipment vendors should use custom policies created by OS, device, or by industry standard (SANS Top 20, Windows Top 10 Vulnerabilities, OWASP Top 10) and specific to your environment. Organizations should identify what scanning methods and operating procedures are best for their company, and document how they would proceed in a standard operating procedure.
||Cable; Internet/Data; Satellite; Wireless; Wireline
||Service Provider; Network Operator; Equipment Supplier
||Cyber Security;Intrusion Detection;Policy;
||Sans Institute, "Vulnerability Management: Tools, Challenges and Best Practices." 2003. Pg. 11, 12.