{"id":371,"date":"2006-11-23T03:38:36","date_gmt":"2006-11-23T03:38:36","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/11\/vulnerability-assessment-and-operational-security-testing-methodology-vaost-version-02-released\/"},"modified":"2015-09-09T19:40:30","modified_gmt":"2015-09-09T11:40:30","slug":"vulnerability-assessment-and-operational-security-testing-methodology-vaost-version-02-released","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/11\/vulnerability-assessment-and-operational-security-testing-methodology-vaost-version-02-released\/","title":{"rendered":"Vulnerability Assessment and Operational Security Testing Methodology (VAOST) – version 0.2 released"},"content":{"rendered":"

[ad]<\/p>\n

Here is a newly released VA methodology, the author believes it to be more focused, and thus cost effective VA process. It may map to internal work, but it is probably more suited to external sites.<\/p>\n

It’s gone through a couple of revisions so it’s a bit more polished now.<\/p>\n

You can find the notes on the first version here<\/a>.<\/p>\n

Version 0.2 has been released after some community endorsement, there is still some work to do though, they hope to add the following shortly:<\/p>\n