OUHSC Information Technology Department


Home  |  Online Help  |  Policies  |  Forms  |  Tier Ones

Vulnerability Assessment:

Supporting documents: Full policyAdobe PDF File - StandardAdobe PDF File

The operating system or environment for all information system resources must undergo a regular vulnerability assessment.

Vulnerabilities to the operating system or environment for information system resources must be identified and corrected to minimize the risks associated with them.

To ensure these vulnerabilities are adequately addressed, the operating system or environment for all information system resources must undergo a regular vulnerability assessment.

The frequency of these vulnerability assessments will be dependant on the operating system or environment, the information system resource classification, and the data classification of the data associated with the information system resource.

See the Vulnerability Testing Standard to help determine the frequency of vulnerability assessments.

Service Request
Contact the IT Service Desk using the Service Request form for assistance with vulnerability assessments. Upon submission, this form creates a record in our tracking system and it will be routed to the appropriate resource for action.