graphgrc

Vulnerability Management Process

Process for identifying, triaging, and remediating security vulnerabilities.

Roles and Responsibilities

Prerequisites

Process Steps

Step 1: Automated Scanning

Vulnerability scanners run automatically on schedule or per event.

Scanning types:

Owner: Automated systems Duration: Continuous

Step 2: Alert and Notification

Vulnerabilities detected trigger alerts to appropriate teams.

Notification routing:

Alert includes:

Owner: Automated systems Duration: Real-time or batched

Step 3: Triage and Prioritization

Security team reviews findings and prioritizes based on risk.

Triage criteria:

Actions:

Owner: Security Team Duration: Within 48 hours of detection

Step 4: Risk Assessment (for exceptions)

If remediation is not feasible, team requests risk exception.

Exception scenarios:

Process:

Owner: Owning team (request), Security team (approval) Duration: Within 5 business days

Step 5: Remediation

Owning team fixes vulnerability within SLA.

Remediation actions:

Best practices:

Owner: Engineering Team or Infrastructure Team Duration: Based on severity SLA (see vulnerability-management-standard.md)

Step 6: Verification

Security team verifies remediation is complete.

Verification methods:

Actions:

Owner: Security Team Duration: Within 48 hours of remediation claim

Step 7: Metrics and Reporting

Security team tracks vulnerability management metrics.

Metrics:

Reporting: Monthly report to leadership, quarterly deep dive

Owner: Security Team Duration: Monthly

SLA Tracking

Automated alerts for vulnerabilities approaching SLA deadline:

Exception Reviews

All risk exceptions reviewed quarterly:

Validation and Evidence

References

Control Mapping


Referenced By

This section is automatically generated by make generate-backlinks. Do not edit manually.