7.7: Remediate Detected Vulnerabilities

Remediate detected vulnerabilities in software through processes and tooling on a monthly, or more frequent, basis, based on the remediation process.

Asset Type

Security Function

Implementation Groups

Applications

Respond

2, 3

Dependencies

  • Safeguard 1.1: Establish and Maintain Detailed Enterprise Asset Inventory

Inputs

  1. GV1: Enterprise asset inventory

  2. Current vulnerability scan

  3. Previous vulnerability scan

  4. Date of current vulnerability scan

  5. Date of previous vulnerability scan

Assumptions

  1. Asset-Vulnerability combinations not found in most recent scan is indicative of remediation of that vulnerability on that asset.

Operations

  1. For each asset in GV1, compare Inputs 2 and 3
    1. Identify and enumerate assets listed with the same vulnerability on both scans (M2)

    2. Identify and enumerate assets previously found in Input 3 that are no longer listed in Input 2 with the same vulnerability (M3)

  2. Compare Inputs 4 and 5 and capture timeframe between scans in days (M4)

Measures

  • M1 = Count of vulnerabilities identified in Input 3

  • M2 = Count of unremediated vulnerabilities

  • M3 = Count of remediated vulnerabilities

  • M4 = Timeframe in between scans

Metrics

If M4 is greater than thirty, this safeguard receives a failing score. The other metrics don’t apply.

Remediation

Metric

The percentage of remediated vulnerabilities

Calculation

M3 / M1