Skip to main content

Vulnerability Management

The Process

Identify → Analyze → Prioritize → Remediate → Validate → Report

Identification Methods

MethodAlso Known AsDescription
SASTStatic analysis / white-boxAnalyzes source code without execution — used in SDLC
DASTDynamic analysis / black-boxAttacks running application — finds runtime issues
Package monitoringSCADiscovers and monitors all installed packages for known CVEs
Penetration testingSimulates real attacks to find exploitable weaknesses
Vulnerability scanningAutomated scans against hosts to enumerate weaknesses

Threat Intelligence Sources

SourceNotes
OSINTWebsites, social media, blogs, conferences — free, first-stage recon
Commercial feedsThird-party providers — curated, integrated into SIEMs
Threat sharing orgsISACs, CISA alerts — actionable intel
Dark web monitoringDetects leaked org data, credentials
Responsible disclosure / Bug bountiesResearchers report flaws before public disclosure

CVE & CVSS

CVE (Common Vulnerabilities and Exposures) — public list of known vulnerabilities. Each gets a unique CVE-YYYY-NNNNN ID. Referenced by NVD, scanners, and SIEMs.

CVSS (Common Vulnerability Scoring System) — qualitative severity score (0–10).

Metric GroupDescription
BaseIntrinsic, unchanging qualities (attack vector, complexity, impact)
TemporalTime-dependent factors (exploit availability, patch status)
EnvironmentalOrganization-specific context (asset value, existing controls)
Score RangeSeverity
0.0None
0.1–3.9Low
4.0–6.9Medium
7.0–8.9High
9.0–10.0Critical

False Positives vs False Negatives

TypeDefinitionRisk
False positiveAlert for a vulnerability that doesn’t existAlert fatigue, wasted remediation effort
False negativeReal vulnerability missed / marked non-existentFalse sense of security, unpatched exposure

Response Strategies

StrategyDescription
PatchingApply vendor fix — primary response
SegmentationIsolate affected systems to limit lateral movement
Compensating controlAlternative measure when patching isn’t possible
Exception / exemptionFormal acceptance of risk with documented justification
InsuranceFinancial backstop for residual risk

Validation After Remediation

1. Rescan  — confirm the vulnerability no longer appears
2. Audit   — verify security controls are implemented correctly
3. Verify  — confirm patch/config change is in production

Prioritization Factors

  • Industry and org impact — asset classification and business impact analysis (BIA)
  • Exposure factor — % of asset value lost if threat is realized
  • Risk tolerance — max acceptable risk after controls are applied
  • Exploitability — is a public exploit available? Is it being used in the wild?