Vulnerability Management Process

This document presents the general vulnerability management process and shows in detail all procedures to be performed when vulnerability is discovered

Process covers the vulnerability reports provided by recurring internal scan results as well as external 3rd party reports.

Also provides general understanding to all involved parties (Information Security Team, Information Asset Owners and Operational Team) of communication flow, responsibilities and desired results.

Scope

This process applies to all Corporate Group owned devices and devices connected to the Corporate Group‘s network and may apply to personally-owned devices if used exclusively or extensively to conduct Corporate Group related business needs.

Periodic Vulnerability Assessment - Existing Asset

Vulnerability assessment must be conducted of all of networked computing devices on a periodic basis.

At a minimum, authenticated scans must be conducted on a quarterly basis.

Monthly scans are required for the following networking computing devices:

  • Critical assets

  • Assets that must meet specific regulatory requirements, e.g., PCI DSS, etc.

  • All file-system images or virtual machine templates used as base images for building and deploying new workstations or servers

  • Any network infrastructure equipment.

Scans must be performed during hours appropriate to the business needs of the entity and to minimize disruption to normal business functions.

No devices connected to the network must be specifically configured to block vulnerability scans from authorized scanning engines.

New Asset Vulnerability Assessment

No new assets shall be considered in production until a vulnerability assessment has been conducted and vulnerabilities addressed.

Corporate Group may conduct vulnerability assessments:

  • At the completion of the operating system installation and patching phase

  • At the completion of the installation of any vendor provided or in-house developed application

  • Just prior to moving the asset into production

  • At the completion of an image or template designed for deployment of multiple devices

  • For vendor provided assets, prior to user acceptance testing and again before moving into production

  • For all new network infrastructure equipment, during the burn in phase and prior to moving to production

At the completion of each of the above vulnerability assessments, all discovered vulnerabilities must be documented and remediated.

Limitation of Scanning

Corporate Group must not conduct intrusive scans of assets that are not under their direct authority.

Networked computing devices that appear to be causing disruptive behavior on the network may be scanned using nonintrusive methods to investigate the source of the disruption.

Remediation

Discovered vulnerabilities must be remediated and/or mitigated based on the following rules:

Critical risk vulnerabilities must be fully addressed within 2 calendar days of discovery.

High risk vulnerabilities must be fully addressed within 7 calendar days of discovery.

Medium risk vulnerabilities must be fully addressed within 30 calendar days of discovery.

Low risk vulnerabilities must be addressed within 90 calendar days of discovery.

Vulnerabilities are considered remediated when the risk of exploitation has been fully removed and subsequent scans of the device show the vulnerability no longer exists.

It may be cases where Corporate Group accepts the risk produced by the vulnerability.

Process Diagram

Vulnerability management procedures

No.
Procedure
Description
Result
Responsible

1.

Scan cycle started

Scan cycle initiated using automated tools.

New scan

Information Security Team

At least once a quarter

2.

Assets gathered and confirmed

Assets are gathered using automated tools and confirmed with Asset Owner.

Asset list

Information Asset Owner

2 days from scan cycle initiation

3.

Automated scanning started

Scan is started using the automated tools

Scan report

Information Security Team

1 day after assets obtained

4.

Vulnerability confirmed

Vulnerability was detected during the scan

Vulnerability report

Information Security Team

Immediately after the vulnerability was detected and no later than in 1 day

Registration

5.

Vulnerability assessment

Identified vulnerability is assessed, risk score is calculated.

Risk score

Information Security Team

Immediately after the vulnerability was confirmed and no later than in 1 day

6.

Register the vulnerability

Vulnerability is registered to the vulnerability management framework

Vulnerability entry

Information Security Team

Immediately, no later than in 1 day

7.

Request change

Request for change / remediation is issued to the asset owner

Ticket created

Information Asset

Owner

1 day after the assessment was completed

Remediation

8.

Remediation

Vulnerability is resolved

Vulnerability mitigated

Operational Team

2 days for critical

7 days for high

30 days for medium

90 days for low risk vulnerability

9.

Log the outcome

Vulnerability ticket is closed, outcome is documented.

Vulnerability mitigation is logged

Information Security Team

Immediately

Review and Update

This Process must be maintained in accordance with the Information Security Policy.

Revision History

Version
Author
Approved By
Revision date
Approval date

0.1

GK

2023-05-20

2023-05-23

0.2

DM

2023-11-02

2023-11-02

0.3

GK

DM

2024-09-10

2024-09-10

Last updated