RH-ISAC 4 Stages of the Vulnerability Management Process (2024)

Vulnerability Management

The four continuous stages of identification, prioritization, remediation, and reporting are essential for an effective vulnerability management process.

RH-ISAC 4 Stages of the Vulnerability Management Process (1)

A vulnerability is a flaw or weakness in a system that, if exploited, would allow a user to gain unauthorized access to conduct an attack. Vulnerability management is the process of identifying, prioritizing, remediating, and reporting on vulnerabilities to proactively reduce your cyber risk. Because new vulnerabilities are constantly being introduced, vulnerability management is not a one-time project but an ongoing lifecycle. As a result, you will never completely eliminate all vulnerabilities, but you can effectively prioritize which ones to remediate.

Your vulnerability management process should include these four key areas:

Identification

The first step to successful vulnerability management is discovering the vulnerabilities that exist within your systems. Because of the sheer volume of vulnerabilities in today’s environments, the most popular way this is done is through vulnerability scanning, which uses automated tools to detect and classify system weaknesses. Vulnerabilities are then mapped to asset inventories so that vulnerabilities can be effectively prioritized based on the assets they impact, and remediation teams can pinpoint the systems that need remediation.

For new environments currently being built, security is shifting left, meaning that security is incorporated into the development process earlier, or directionally left, in the development workflow. This is a departure from traditional development, in which security was often introduced only after an environment was built. This DevSecOps approach avoids bottlenecks at the final stage of deployment, which is essential to the Continuous Integration, Continuous Delivery (CI/CD) pipeline. Today’s vulnerability scanning tools are designed to integrate into the application development process and function in a cloud environment.

Additionally, scanning of open-source frameworks, libraries, and dependencies, should be an essential part of your discovery process. While using open-source code saves developers time and money by borrowing from the collective expertise of the community, this code is often more vulnerable than proprietary code. It is publicly available to hackers to search for unpatched zero-days and written by various developers that may not be applying rigorous security standards as you would in your own organization.

Prioritization

Once vulnerabilities are detected, the next step is to prioritize which ones are the most important to remediate. Modern vulnerability scanning tools will provide suggestions for prioritization based on the Common Vulnerability Scoring System (CVSS) rating of the vulnerability. A vulnerability’s CVSS score is the severity score assigned to it as part of its record in the Common Vulnerabilities and Exposures (CVE) database, a standardized database of known vulnerabilities. This score is calculated using the CVSS, which uses a base score to determine severity based solely on the properties of the vulnerability.

While this score can be augmented by temporal and environmental metrics, the CVSS base score alone is lacking in context and is therefore not the only factor to consider in prioritizing vulnerabilities. A risk-based approach to prioritization should be applied, which takes into account other factors such as the conditions needed for exploitation, as well the importance of the asset to business operations. That being said, high-scoring CVE vulnerabilities shouldn’t be ignored, and they need to be remediated to comply with regulatory requirements. For example, the Payment Card Industry Data Security Standard (PCI-DSS), which governs the storage of credit card information, requires that vulnerabilities above CVSS 4.0 in the cardholder data environment be addressed to maintain compliance.

Generally, however, you will want to take into account the vulnerability’s severity, as well as likelihood of exploitation, and the business impact of a successful exploit. Penetration testing can be conducted during this phase to confirm these factors in a real-world simulation.

Remediation

Once you have prioritized which vulnerabilities pose a threat to your business, you want to take steps to remediate them. Remediation is taking action to eliminate the vulnerability, such as applying a patch, in the case of third-party software. Remediation is generally the preferred long-term course of action, but it is not always an option, which is where mitigation comes into play.

Mitigation is taking other efforts, such as changing configurations or applying compensating controls, that reduce the impact of a vulnerability, as opposed to completely removing it. Patching is not always an easy, seamless process. It can result in downtime to critical business functions, which may not be ideal, particularly during peak seasons, such as during the holidays for retailers. Similarly, a patch, or fix for propriety code, may not be readily available. In these situations, mitigation tactics may be used until remediation can be accomplished.

Remediation and mitigation will also only apply to the vulnerabilities that you’ve prioritized to be fixed. There may be low-severity vulnerabilities that won’t require a course of action, or you may find that a vulnerability is not applicable, as it is not being used in a live environment, or other settings have already rendered it obsolete.

Reporting

Lastly, you want to make sure that your remediation efforts have worked by conducting a follow-up assessment after actions have been taken. You’ll never be able to completely eliminate all vulnerabilities from your environment, but you do want to have metrics in place for determining the success of your vulnerability management program. This may include keeping track of the percentage of your systems that have high-priority vulnerabilities, the mean time it takes you to remediate a vulnerability after discovery, and the number of false positives and negatives detected, as these will slow productivity if time is being invested in remediating non-issues. Reporting ensures that there is accountability in your vulnerability management program and progress is being made to reduce risk.

Are you interested in collaborating with other security professionals to improve your vulnerability management program? RH-ISAC members can join RH-ISAC’s vulnerability management working group to participate in vulnerability management discussions and exchange of best practices. Learn more about RH-ISAC membership.

Subscribe to the Blog

Receive news and RH‑ISAC updates for cybersecurity practitioners from retail, hospitality, and other customer-facing companies, straight to your inbox.

Subscribe Now

More Recent Blog Posts

View All Blogs

RH-ISAC 
	  4 Stages of the Vulnerability Management Process (2024)
Top Articles
Can You Use a VPN in China in 2024 (Full Guide) - The Food Ranger
Port 1688 (tcp/udp)
Tabc On The Fly Final Exam Answers
Toyota Campers For Sale Craigslist
<i>1883</i>'s Isabel May Opens Up About the <i>Yellowstone</i> Prequel
When Is the Best Time To Buy an RV?
Derpixon Kemono
Savage X Fenty Wiki
Declan Mining Co Coupon
Tiger Island Hunting Club
Weekly Math Review Q4 3
Programmieren (kinder)leicht gemacht – mit Scratch! - fobizz
Lonadine
Dump Trucks in Netherlands for sale - used and new - TrucksNL
2015 Honda Fit EX-L for sale - Seattle, WA - craigslist
Telegram Scat
Epro Warrant Search
How pharmacies can help
Inter-Tech IM-2 Expander/SAMA IM01 Pro
360 Tabc Answers
Richland Ecampus
Arre St Wv Srj
Nhl Tankathon Mock Draft
Ubg98.Github.io Unblocked
SuperPay.Me Review 2023 | Legitimate and user-friendly
Used Safari Condo Alto R1723 For Sale
Sef2 Lewis Structure
Www Craigslist Madison Wi
Johnnie Walker Double Black Costco
6 Most Trusted Pheromone perfumes of 2024 for Winning Over Women
Sister Souljah Net Worth
Regina Perrow
Die 8 Rollen einer Führungskraft
How do you get noble pursuit?
Danielle Moodie-Mills Net Worth
Maths Open Ref
Evil Dead Rise Showtimes Near Regal Sawgrass & Imax
Purdue Timeforge
Pokemmo Level Caps
123Moviestvme
Top-ranked Wisconsin beats Marquette in front of record volleyball crowd at Fiserv Forum. What we learned.
Gold Nugget at the Golden Nugget
Tirage Rapid Georgia
Is The Nun Based On a True Story?
How to Print Tables in R with Examples Using table()
Immobiliare di Felice| Appartamento | Appartamento in vendita Porto San
Denise Monello Obituary
Garland County Mugshots Today
N33.Ultipro
Sam's Club Gas Price Sioux City
Hughie Francis Foley – Marinermath
Jimmy John's Near Me Open
Latest Posts
Article information

Author: Saturnina Altenwerth DVM

Last Updated:

Views: 6110

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Saturnina Altenwerth DVM

Birthday: 1992-08-21

Address: Apt. 237 662 Haag Mills, East Verenaport, MO 57071-5493

Phone: +331850833384

Job: District Real-Estate Architect

Hobby: Skateboarding, Taxidermy, Air sports, Painting, Knife making, Letterboxing, Inline skating

Introduction: My name is Saturnina Altenwerth DVM, I am a witty, perfect, combative, beautiful, determined, fancy, determined person who loves writing and wants to share my knowledge and understanding with you.