Skip to content
Tools & Services

Vulnerability Response

Quick identification of at-risk systems or services with responsible notification to the owners of those services.

Contact
For questions about this central point to coordinate the discovery and disclosure of potential security vulnerabilities, please email securitysupport@illinois.edu.

Please note that while the Cyber Security Operations Center (CSOC) performs security vulnerability scans in many instances, individual system, infrastructure, and service stewards are responsible for discovering and managing their exposures, vulnerabilities, and associated risks.

The vulnerability program aims to meet the needs identified in the IT security controls by establishing best practices for the security office and distributed IT Professionals. The key to any vulnerability program is the quick identification of at-risk systems or services with responsible notification to the owners of those services. The program meets this need by serving as a central point to coordinate the discovery and disclosure of potential security vulnerabilities.