https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf
This NIST Special Publication is a guide to the basic technical aspects of conducting information security assessments.
NIST SP 800-30 Guide for Conducting Risk Assessments
3.11 3.11.1 Risk Assessment
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-30r1.pdf
This NIST Special Publication provides guidance for conducting risk assessments.
NIST SP 800-53: RA-3 Risk Assessment
Risk Assessment
https://nvd.nist.gov/800-53/Rev4/control/RA-3
NIST resource that defines prerequisite for effective risk assessments.
North Carolina – Risk Assessment Policy
Risk Assessment
https://it.nc.gov/documents/statewide-policies/scio-risk-assessment/download?attachment
The North Carolina Risk Assessment (RA) Policy is a comprehensive treatment of a security risk assessment that includes defining risk categories, risk sources, risk measurement criteria, scheduling RAs and establishes the role of vulnerability scanning in RAs.
Open Web Application Security Project (OWASP) – Vulnerability Scanning Tools
3.11 3.11.2 Risk Assessment
https://owasp.org/www-community/Vulnerability_Scanning_Tools
Open Web Application Security Project (OWASP) provides a list of commercial and free vulnerability scanning tools for various platforms.
https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/blt16603a027193d8b9/5e9e0685f92340115007214d/risk_assessment_policy.pdf
This SANS provided policy discusses performing periodic information security risk assessments.
https://www.sans.org/white-papers/35932/
This SANS whitepaper examines the role of project management in building a successful vulnerability management program.
https://www.sans.org/white-papers/34180/
This SANS whitepaper looks at how a vulnerability management process could be designed and implemented within an organization.
SANS Whitepaper – Vulnerabilities & Vulnerability Scanning
3.11 3.11.2 Risk Assessment
https://www.sans.org/white-papers/1195/
This SANS whitepaper discusses the benefits and pitfalls of Vulnerability Scanning suggests an approach suitable for small and medium-sized businesses.
State of Alabama – Vulnerability Scanning Policy
3.11 3.11.2 Risk Assessment
https://oit.alabama.gov/wp-content/uploads/2022/07/Policy_672_Vulnerability_Scanning.pdf
The following is an example from the state of Alabama of a vulnerability scanning policy.