SLAC Computer Security
Search SLAC

Scanning and Disconnect Procedures

Computer security is tasked with assessing SLAC information resources for vulnerabilities that can negatively impact SLAC computing processess. SLAC computer security receives from various sources, notices of security bulletins, patches and application updates.  We review the vulnerabilities for applicability to SLAC.  Any vulnerability that is publicly exploitable or categorized as "High" using the National Vulnerabiltiy Database Common Vulnerability Scoring System (CVSS) scores (typically a 7 or higher) are assessed, tested and must be installed as soon as possible.  All other patches and updates must be installed no more than 60 days after notification.

*Note: Computer Security may scan system again for compliance.


IT Risk Management Policy

Configuration Management Policy

Owner: SLAC Computer Security
Page Created: 05/22/2007
Last Updated: 6/28/2011
Feedback: Please send to
Computer Security Feedback