Credentialed vs. Non-Credentialed

Vulnerability scans are security assessments conducted to identify vulnerabilities in systems, networks, or applications. Two common approaches for vulnerability scanning are credentialed and non-credentialed scans, each with its own advantages and limitations.

1. Credentialed Vulnerability Scans

Credentialed vulnerability scans are performed with privileged access or credentials, typically administrative or privileged accounts. This allows the scanner to gain deeper visibility into the target systems and applications, enabling comprehensive scanning and identification of vulnerabilities that require elevated privileges to detect.

Advantages:

2. Non-Credentialed Vulnerability Scans

Non-credentialed vulnerability scans are performed without privileged access or credentials. These scans rely on network-based scanning techniques and do not have visibility into the internal system configurations or installed software.

Advantages:

Limitations: