Like an upgrade or uplift of a simple network vulnerability scan, almost every enterprise vulnerability assessment includes most of these key phases:
Asset inventory
Each asset is mapped out just as you would for a vulnerability scan, but in greater detail.
Credentialed scanning
Here, a scan is conducted as above, but with elevated user privileges. This provides a great deal more information. However, the most important part is that it shows what your network looks like to the kind of unauthorized user who has acquired or faked the credentials needed for high-level access. This is who you really need to protect against.
Passive scanning
Passive scanning is conducted at the packet layer. Because it sends few or no packets, it has a lower likelihood of causing instabilities in the systems being scanned.
Agent-based scanning
In agent-based scanning, AI or ML tools are deployed to conduct non-credentialed, fully automated scans for vulnerabilities.
Vulnerability prioritization
Here, the severity of the vulnerabilities found by the scans listed above is judged. These results can be ranked by whichever category of risk the client is most interested in. Typical prioritization methods include:
Ranking vulnerabilities in terms of their business impact
Ranking vulnerabilities in terms of the risk to the company of a successful exploitation
Ranking vulnerabilities in terms of how easy it would be to exploit them in a meaningful way
Remediation tracking
With remediation tracking, a kind of to-do list is created, with an entry for every single vulnerability or weakness found on the client's systems. This ensures that none of them fall through the cracks or are never addressed at all.
Each of these steps is vital to conducting a thorough, exhaustive assessment, which can be used effectively for either software vulnerability management or enterprise vulnerability assessment in a broader sense.