Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

7.1.1. Assessment Types and Scoping

💡 First Principle: A vulnerability scanner is a tool; vulnerability assessment is a process. The scanner identifies potential vulnerabilities; the assessment validates findings, eliminates false positives, contextualizes risk, and produces actionable prioritized remediation plans. Raw scanner output is not an assessment — it is input to an assessment.

Scan types and their characteristics:
Scan TypeAuthenticationWhat It FindsUse Case
Unauthenticated (external)NoneExposed services; network-level vulns; banner infoSimulates external attacker; minimal access required
Authenticated (credentialed)OS/app credentialsInstalled software versions; patch state; config settingsMore comprehensive; fewer false positives; requires credential management
Agent-basedAgent on hostSame as authenticated + real-time continuous monitoringBest coverage; requires deployment and maintenance
Web application scanOptionalOWASP Top 10 class vulnerabilities; input handling; auth issuesRequires app-specific scanner, not port/service scanner
CVSS v3.1 score groups:
Metric GroupWhat It MeasuresAdjustable?
Base ScoreIntrinsic vulnerability characteristics (attack vector, complexity, impact on CIA)No
Temporal ScoreCurrent exploitation state (exploit code maturity, fix availability)Yes — changes over time
Environmental ScoreOrganization-specific context (asset criticality, compensating controls)Yes — per organization
CVSS severity bands:
ScoreSeverityTypical Response SLA
0.1–3.9Low180 days
4.0–6.9Medium90 days
7.0–8.9High30 days
9.0–10.0Critical15 days (immediately if actively exploited)
False positives vs. false negatives:
  • False positive: Scanner reports a vulnerability that isn't actually present or exploitable. Cause: version detection errors, outdated signatures, missing context. Effect: wastes remediation effort; erodes trust.
  • False negative: Scanner misses a real vulnerability. Cause: insufficient signatures, encrypted traffic, coverage gaps. Effect: false assurance.

Authenticated scans have significantly fewer false positives than unauthenticated scans because they read actual installed versions rather than guessing from service banners.

Vulnerability management lifecycle:

⚠️ Exam Trap: A penetration test and a vulnerability assessment are not interchangeable. A vulnerability assessment identifies and reports potential vulnerabilities — it does not exploit them. A penetration test actively exploits vulnerabilities to confirm they are real, chains them together, and demonstrates actual impact. VA provides coverage breadth; pentest provides confirmed exploitability and business impact.

Reflection Question: An organization runs quarterly authenticated vulnerability scans and achieves 92% patch compliance within SLA. The CISO presents this as evidence of a mature vulnerability management program. A penetration tester then compromises the organization through a business logic flaw in the web application and an unpatched legacy system not in the asset inventory. What three gaps does this reveal about the vulnerability management program?

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications