{"id":2207,"date":"2023-04-12T22:21:37","date_gmt":"2023-04-12T22:21:37","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2019\/04\/17\/how-to-conduct-a-vulnerability-assessment-5-steps-toward-better-cybersecurity\/"},"modified":"2023-06-06T16:16:05","modified_gmt":"2023-06-06T16:16:05","slug":"vulnerability-assessment-process","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/","title":{"rendered":"7 Steps of the Vulnerability Assessment Process Explained"},"content":{"rendered":"\n<p>A <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment\/\">vulnerability assessment<\/a> is one of the most important pieces of an enterprise\u2019s vulnerability management lifecycle because you can\u2019t fix security vulnerabilities you know nothing about.<\/p>\n\n\n\n<p>Through the vulnerability assessment process, networks and assets are scanned and newly discovered vulnerabilities are analyzed and scored based on risk. With completed vulnerability assessments, cybersecurity and vulnerability specialists will have the knowledge they need to make security adjustments that make a difference.<\/p>\n\n\n\n<p>But vulnerability assessments are only as successful as the plans behind them. If you don\u2019t have the right teams, tools, and strategies in place, you\u2019ll likely miss an important step and unwittingly leave your network as vulnerable as it was before. This guide will help you identify the steps of the vulnerability assessment process, how they apply to your organization, and whether or not your organization needs to assess vulnerabilities at all (spoiler \u2014 you do).<\/p>\n\n\n\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-management\/\"><strong>Vulnerability Management: Definition, Process &amp; Tools<\/strong><\/a><\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_68_1 ez-toc-wrap-left counter-flat ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-66d6faf350a41\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"ez-toc-cssicon\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-66d6faf350a41\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Step-1-Define-Parameters-and-Plan-Assessment\" title=\"Step 1: Define Parameters and Plan Assessment\">Step 1: Define Parameters and Plan Assessment<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Step-2-Scan-Network-for-Vulnerabilities\" title=\"Step 2: Scan Network for Vulnerabilities\">Step 2: Scan Network for Vulnerabilities<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Step-3-Analyze-Results\" title=\"Step 3: Analyze Results\">Step 3: Analyze Results<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Step-4-Prioritize-Vulnerabilities\" title=\"Step 4: Prioritize Vulnerabilities\">Step 4: Prioritize Vulnerabilities<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Step-5-Create-the-Vulnerability-Assessment-Report\" title=\"Step 5: Create the Vulnerability Assessment Report\">Step 5: Create the Vulnerability Assessment Report<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Step-6-Use-Results-to-Inform-Remediation-and-Mitigation\" title=\"Step 6: Use Results to Inform Remediation and Mitigation\">Step 6: Use Results to Inform Remediation and Mitigation<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Step-7-Regularly-Repeat-Vulnerability-Assessments\" title=\"Step 7: Regularly Repeat Vulnerability Assessments\">Step 7: Regularly Repeat Vulnerability Assessments<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#How-to-Use-Vulnerability-Assessment-Tools\" title=\"How to Use Vulnerability Assessment Tools\">How to Use Vulnerability Assessment Tools<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Should-Everyone-Run-Vulnerability-Assessments\" title=\"Should Everyone Run Vulnerability Assessments?\">Should Everyone Run Vulnerability Assessments?<\/a><\/li><li class='ez-toc-page-1'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#Bottom-Line-Vulnerability-Assessment-Process\" title=\"Bottom Line: Vulnerability Assessment Process\">Bottom Line: Vulnerability Assessment Process<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step-1-Define-Parameters-and-Plan-Assessment\"><\/span>Step 1: Define Parameters and Plan Assessment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Before you can start the assessment process, you need to first determine the scope of your assessment and the exact components of your network that need to be assessed, such as hardware, user devices, applications, and network infrastructure.<\/p>\n\n\n\n<p>An important part of the planning process will be an initial discovery phase, where you identify assets and determine baselines for their individual security capabilities, risk tolerance, user permissions, configuration, and other factors. The asset discovery process can be particularly arduous if your network includes BYOD mobile devices or IoT devices, but certain <a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\">vulnerability management tools<\/a> make it easier to identify and assess these kinds of assets.<\/p>\n\n\n\n<p>Now, you\u2019ll need to determine who will be involved in the assessment process, what tools you\u2019ll be using, the timeline for assessment and remediation, and how frequently these assessments need to be completed. If you are not already using third-party tools to scan and analyze vulnerabilities, now is the time to research the market and determine if you have all the resources you need for a successful assessment.<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\"><strong>Top IT Asset Management (ITAM) Tools for Security<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step-2-Scan-Network-for-Vulnerabilities\"><\/span>Step 2: Scan Network for Vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Now, it\u2019s time to scan your network for security vulnerabilities, either manually or via automated <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">vulnerability scanner tools<\/a>. Although some enterprise-level vulnerability scanners can be incredibly expensive, there are also <a href=\"https:\/\/www.esecurityplanet.com\/applications\/open-source-vulnerability-scanners\/\">free and open-source solutions<\/a> that might be a fit for your organization.<\/p>\n\n\n\n<p>Alongside the actual scan, you\u2019ll use <a href=\"https:\/\/www.esecurityplanet.com\/networks\/threat-intelligence-and-analytics-staying-ahead-of-cyber-criminals\/\">threat intelligence<\/a> and vulnerability databases to identify security flaws and weaknesses and filter out false positives. Don\u2019t be too concerned if your scan\u2019s results show numerous network vulnerabilities; that\u2019s to be expected, especially the first time your organization starts to focus on vulnerability management and remediation.<\/p>\n\n\n\n<p><strong>Also read: <\/strong><strong>&nbsp;<\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-what-it-is-and-how-to-do-it-right\/\"><strong>What is Vulnerability Scanning? Definition, Types &amp; Guide<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step-3-Analyze-Results\"><\/span>Step 3: Analyze Results<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Your network vulnerability scan has likely returned massive amounts of vulnerability data, much of which is unstructured \u2014 now it\u2019s time to analyze and organize that data. Consider not only the criticality of a vulnerability and the likelihood of it being exploited but also what network resources will be impacted if an attack targets that vulnerability. This data will be especially important when communicating with business stakeholders about the steps you want to take to remediate specific vulnerabilities.<\/p>\n\n\n\n<p>As an additional note, it\u2019s a good idea to look beyond vulnerability scan results. Ideally, you\u2019ll also have data from firewall logs, <a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing\/\">penetration tests<\/a>, and network scans to review as well.<\/p>\n\n\n\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/penetration-testing-vs-vulnerability-testing\/\"><strong>Penetration Testing vs. Vulnerability Testing<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step-4-Prioritize-Vulnerabilities\"><\/span>Step 4: Prioritize Vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The most severe vulnerabilities in your vulnerability scans will need to be identified and addressed first. Critical vulnerabilities are security issues that are already causing damage and\/or unwarranted access to the network and should be at the top of your risk prioritization list. Right below these vulnerabilities are the ones that have possible exploits malicious actors could take advantage of in the future.<\/p>\n\n\n\n<p>While all vulnerabilities will need to be addressed at some point, your initial vulnerability scan will return overwhelming numbers of vulnerabilities that you cannot correct all at once. This step is an important move toward making your vulnerability assessment data measurable and actionable.<\/p>\n\n\n\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/threats\/millions-of-systems-exposed-to-vulnerabilities\/\"><strong>Over 15 Million Systems Exposed to Known Exploited Vulnerabilities<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step-5-Create-the-Vulnerability-Assessment-Report\"><\/span>Step 5: Create the Vulnerability Assessment Report<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Now that you\u2019ve completed the vulnerability assessment scan, analysis, and risk prioritization steps, it\u2019s time to document your findings in a vulnerability assessment report. This report will detail all vulnerabilities that were discovered, along with their severity, potential attack vectors within the network, and possible solutions.<\/p>\n\n\n\n<p>Portions of this report can use technical jargon and instructions directed at the cybersecurity or vulnerability specialists who will be remediating and mitigating vulnerabilities. However, the report still needs to include visualizations and explanations that help less-technical business leaders \u2014 like the CEO \u2014 understand the work that\u2019s being done and why.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step-6-Use-Results-to-Inform-Remediation-and-Mitigation\"><\/span>Step 6: Use Results to Inform Remediation and Mitigation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>You\u2019ve identified and prioritized security vulnerabilities on and in your network, and now that you\u2019ve reported on these problems and your plans to resolve them, it\u2019s time to act. You may be able to remediate some of your most critical vulnerabilities with actual patches, but others will require lesser mitigation techniques. Regardless of the solutions you pursue, regularly refer back to your vulnerability assessment to ensure you\u2019re focusing on the right vulnerabilities in the right order.<\/p>\n\n\n\n<p><strong>See the <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\"><strong>Best Patch Management Software &amp; Tools<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Step-7-Regularly-Repeat-Vulnerability-Assessments\"><\/span>Step 7: Regularly Repeat Vulnerability Assessments<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Vulnerability assessments provide great snapshots of your <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network security<\/a> landscape when they\u2019re first conducted; but almost as soon as the assessment is complete, new applications, users, permissions, datasets, and other features change the landscape of your network and open it up to additional threats. It\u2019s necessary to continue cycling through the vulnerability assessment process because new vulnerabilities will emerge and existing vulnerabilities may grow more severe over time.<\/p>\n\n\n\n<p><strong>More on risk management:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/networks\/cybersecurity-risk-management\/\">What is Cybersecurity Risk Management?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/risk-management-software\/\">Best Risk Management Software<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/third-party-risk-management\/\">Best Third-Party Risk Management (TPRM) Tools<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How-to-Use-Vulnerability-Assessment-Tools\"><\/span>How to Use Vulnerability Assessment Tools<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Vulnerability assessment tools can automate or even take over certain steps in the vulnerability assessment process, saving your network security team time for more complex strategic work. Some of the most common types of vulnerability assessment tools are asset discovery tools, vulnerability scanners, vulnerability assessments and reports, vulnerability management tools, and risk prioritization tools. Each of these solutions focuses on different steps in the vulnerability assessment process and can be incredibly useful for teams that want to automate their vulnerability assessment and management workflows.<\/p>\n\n\n\n<p>But before you invest in vulnerability assessment tools, it\u2019s important to first learn how they work. Use these tips and best practices to use your vulnerability assessment tools more effectively:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Investigate your existing cybersecurity suites:<\/strong> Many vulnerability assessment tools are part of a greater vulnerability management or cybersecurity suite. If you\u2019re already working with an <a href=\"https:\/\/www.esecurityplanet.com\/products\/mssp\/\">MSSP<\/a> or other <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-cybersecurity-companies\/\">preferred security vendor<\/a>, start by asking them if they provide any vulnerability assessment tools that would work for your network\u2019s needs.<\/li>\n\n\n\n<li><strong>Select the appropriate tool format for your network:<\/strong> Some vulnerability assessment tools are delivered in formats that might not work for your particular network. For instance, certain appliances won\u2019t work on cloud networks and need to be replaced with a virtual appliance. Others may not meet the <a href=\"https:\/\/www.esecurityplanet.com\/networks\/security-compliance\/\">regulatory compliance standards<\/a> that your organization is held to.<\/li>\n\n\n\n<li><strong>Use multiple vulnerability scanning tools where appropriate:<\/strong> Your organization may benefit from using multiple vulnerability scanning and management tools in conjunction. For example, many organizations choose to use both a paid third-party scanner and an open-source scanner to compare results and get a better picture of the attack vectors hackers may be using.<\/li>\n\n\n\n<li><strong>Integrate vulnerability assessment tools with the rest of your solutions stack:<\/strong> If you\u2019re interested in making the most of your vulnerability assessment investment, look for tools that can integrate with the DevOps, ITSM, and ticketing tools you already use.<\/li>\n<\/ul>\n\n\n\n<p><strong>Also read: <\/strong><a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\"><strong>The 8 Best Vulnerability Scanner Tools<\/strong><\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Should-Everyone-Run-Vulnerability-Assessments\"><\/span>Should Everyone Run Vulnerability Assessments?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>All companies should run vulnerability assessments, regardless of the size and complexity of their networks. Any kind of network can be exploited by malicious actors at any time, so it\u2019s important to regularly assess and solidify the weakest parts of your networking infrastructure. Particularly if you work with sensitive data that is subject to compliance regulations like HIPAA or GDPR, vulnerability assessments help you to document the steps you\u2019re taking to protect user data and comply with regulatory requirements.<\/p>\n\n\n\n<p>Smaller companies may be hesitant to run vulnerability assessments because they don\u2019t have the cybersecurity staff or the budget to invest in enterprise-level tools. Fortunately, there are many <a href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-scanning-tools\/\">free vulnerability scanners<\/a> and other tools that can simplify the process. Even if you end up requiring the services of a third-party provider or tool, your improved security posture will be worth the cost. Preventing a single major breach may cover the cost.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bottom-Line-Vulnerability-Assessment-Process\"><\/span>Bottom Line: Vulnerability Assessment Process<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>When a person is sick, they need to be treated, but it\u2019s important for healthcare providers to first determine what\u2019s wrong and what treatments will be most effective. And, for a person who appears to be healthy, going to the physician for regular checkups is one of the best ways to quickly identify and treat life-threatening illnesses before they get worse.<\/p>\n\n\n\n<p>Vulnerability assessments serve the same purpose for enterprise networks, helping network security professionals identify the types, quantities, locations, and severity of different security vulnerabilities before they turn into bigger problems. Regardless of the size of your network, you owe it to your internal team and your customers to conduct regular and comprehensive vulnerability assessments so you can better protect sensitive data, applications, and other business assets.<\/p>\n\n\n\n<p><strong>Further reading:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.esecurityplanet.com\/products\/vulnerability-management-software\/\"><strong>Top Vulnerability Management Tools<\/strong><\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.esecurityplanet.com\/applications\/patch-management-as-a-service\/\"><strong>Is the Answer to Vulnerabilities Patch Management as a Service?<\/strong><\/a><\/li>\n<\/ul>\n\n\n\n<p><em>This updates a April 17, 2019 article by <\/em><a href=\"https:\/\/www.esecurityplanet.com\/author\/jeff-goldman\/\"><em>Jeff Goldman<\/em><\/a><\/p>\n\n\n<div id=\"ta-campaign-widget-66d6faf34e4b7-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6faf34e4b7\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6faf34e4b7\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6faf34e4b7\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6faf34e4b7\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6faf34e4b7\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6faf34e4b7\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability assessment is one of the most important pieces of an enterprise\u2019s vulnerability management lifecycle because you can\u2019t fix security vulnerabilities you know nothing about. Through the vulnerability assessment process, networks and assets are scanned and newly discovered vulnerabilities are analyzed and scored based on risk. With completed vulnerability assessments, cybersecurity and vulnerability specialists [&hellip;]<\/p>\n","protected":false},"author":328,"featured_media":25827,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[30774,4296,28043,30773,10917],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,31780,380,375,376,31775,392],"class_list":["post-2207","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-breach-and-attack-simulation","tag-penetration-testing","tag-threat-hunting","tag-vulnerability-assessment","tag-vulnerability-scanning","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-patch-management","b2b_product-policy-compliance","b2b_product-security-management","b2b_product-security-services","b2b_product-web-applications-security","b2b_product-web-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 Steps of the Vulnerability Assessment Process Explained<\/title>\n<meta name=\"description\" content=\"Learn how to conduct a vulnerability assessment by following our step-by-step guide. Master the vulnerability assessment process now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Steps of the Vulnerability Assessment Process Explained\" \/>\n<meta property=\"og:description\" content=\"Learn how to conduct a vulnerability assessment by following our step-by-step guide. Master the vulnerability assessment process now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-12T22:21:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-06T16:16:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"552\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Shelby Hiter\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shelby Hiter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\"},\"author\":{\"name\":\"Shelby Hiter\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5\"},\"headline\":\"7 Steps of the Vulnerability Assessment Process Explained\",\"datePublished\":\"2023-04-12T22:21:37+00:00\",\"dateModified\":\"2023-06-06T16:16:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\"},\"wordCount\":1650,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"keywords\":[\"breach and attack simulation\",\"penetration-testing\",\"threat hunting\",\"vulnerability assessment\",\"vulnerability scanning\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\",\"name\":\"7 Steps of the Vulnerability Assessment Process Explained\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"datePublished\":\"2023-04-12T22:21:37+00:00\",\"dateModified\":\"2023-06-06T16:16:05+00:00\",\"description\":\"Learn how to conduct a vulnerability assessment by following our step-by-step guide. Master the vulnerability assessment process now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg\",\"width\":1000,\"height\":552,\"caption\":\"Vulnerability detection, patch management and vulnerability mitigation protects against attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Steps of the Vulnerability Assessment Process Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5\",\"name\":\"Shelby Hiter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg\",\"caption\":\"Shelby Hiter\"},\"description\":\"eSecurity Planet contributor Shelby Hiter has covered cybersecurity, AI and more in her time at TechnologyAdvice. In addition to eSecurity Planet, she's worked as a technology editor and writer for TechRepublic, LinuxToday, Webopedia, SoftwarePundit, Datamation, Enterprise Networking Planet, CIO Insight, AllBusiness.com, and SiteProNews. Beyond B2B content strategy and editing, she also specializes in marketing and communication strategies and the occasional photo collage of her dog.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/shelby-hiter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Steps of the Vulnerability Assessment Process Explained","description":"Learn how to conduct a vulnerability assessment by following our step-by-step guide. Master the vulnerability assessment process now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/","og_locale":"en_US","og_type":"article","og_title":"7 Steps of the Vulnerability Assessment Process Explained","og_description":"Learn how to conduct a vulnerability assessment by following our step-by-step guide. Master the vulnerability assessment process now.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/","og_site_name":"eSecurity Planet","article_published_time":"2023-04-12T22:21:37+00:00","article_modified_time":"2023-06-06T16:16:05+00:00","og_image":[{"width":1000,"height":552,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","type":"image\/jpeg"}],"author":"Shelby Hiter","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Shelby Hiter","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/"},"author":{"name":"Shelby Hiter","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5"},"headline":"7 Steps of the Vulnerability Assessment Process Explained","datePublished":"2023-04-12T22:21:37+00:00","dateModified":"2023-06-06T16:16:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/"},"wordCount":1650,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","keywords":["breach and attack simulation","penetration-testing","threat hunting","vulnerability assessment","vulnerability scanning"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/","url":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/","name":"7 Steps of the Vulnerability Assessment Process Explained","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","datePublished":"2023-04-12T22:21:37+00:00","dateModified":"2023-06-06T16:16:05+00:00","description":"Learn how to conduct a vulnerability assessment by following our step-by-step guide. Master the vulnerability assessment process now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/11\/eSP-Vulnerability-Patching-scaled-e1670371789135.jpeg","width":1000,"height":552,"caption":"Vulnerability detection, patch management and vulnerability mitigation protects against attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/vulnerability-assessment-process\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"7 Steps of the Vulnerability Assessment Process Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/51431ee32bfc3fa2279f6919ce5cbde5","name":"Shelby Hiter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/03\/93f7cf0106609c5bf3f27081f985d574-150x150.jpeg","caption":"Shelby Hiter"},"description":"eSecurity Planet contributor Shelby Hiter has covered cybersecurity, AI and more in her time at TechnologyAdvice. In addition to eSecurity Planet, she's worked as a technology editor and writer for TechRepublic, LinuxToday, Webopedia, SoftwarePundit, Datamation, Enterprise Networking Planet, CIO Insight, AllBusiness.com, and SiteProNews. Beyond B2B content strategy and editing, she also specializes in marketing and communication strategies and the occasional photo collage of her dog.","url":"https:\/\/www.esecurityplanet.com\/author\/shelby-hiter\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/2207"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/328"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=2207"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/2207\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25827"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=2207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=2207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=2207"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=2207"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=2207"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=2207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}