Vulnerability Management Policy

Document Version: 1.0
Last Updated: July 19, 2025
SOC 2 Mapping: CC7.1, CC7.2, CC7.3, CC7.4, A1.2

1. Purpose

This policy establishes a structured approach to identifying, assessing, prioritizing, remediating, and verifying the resolution of security vulnerabilities across DevSecOpsBook systems, applications, and infrastructure. It ensures risks are effectively managed in alignment with SOC 2 trust principles for security and availability.

2. Scope

This policy applies to all:

  • Servers, containers, endpoints, and cloud infrastructure
  • Source code repositories and CI/CD pipelines
  • Software dependencies, open-source components, and third-party libraries
  • Employees and contractors responsible for managing systems

3. Responsibilities

  • Security Team: Oversees vulnerability program and toolsets, conducts periodic scans, reports findings, and coordinates remediation.
  • Engineering & DevOps Teams: Own remediation of vulnerabilities in code, infrastructure, and dependencies.
  • Vendors: Must demonstrate adherence to acceptable patching and vulnerability handling practices.

4. Vulnerability Identification

  • Automated Scanning: All production and staging systems must be scanned weekly using approved tools (e.g., Snyk, Trivy, AWS Inspector).
  • Code Scanning: Static and dynamic analysis must be conducted on all code bases via CI pipelines.
  • Dependency Checks: Use software composition analysis (SCA) tools to detect risks in third-party packages.
  • Bug Bounty & Disclosures: Security team shall monitor and triage vulnerabilities reported via responsible disclosure programs.

5. Risk Rating & Prioritization

Vulnerabilities will be rated using CVSS (Common Vulnerability Scoring System):

  • Critical (CVSS ≥ 9.0)
  • High (7.0 ≤ CVSS < 9.0)
  • Medium (4.0 ≤ CVSS < 7.0)
  • Low (CVSS < 4.0)

6. Remediation Timelines

SeverityAction RequiredTime to Remediate
CriticalImmediate patch or mitigation≤ 24 hours
HighPrioritized remediation≤ 5 business days
MediumStandard remediation≤ 15 business days
LowScheduled based on impact≤ 30 business days

If remediation is not feasible, risk acceptance or compensating controls must be documented and approved by the CISO.

7. Verification & Retesting

  • After remediation, retesting is mandatory to confirm closure.
  • Closed vulnerabilities must be logged, and evidence maintained for audit purposes.
  • Metrics on open, resolved, and overdue vulnerabilities shall be reviewed monthly.

8. Patch Management

  • Systems and libraries must receive timely security updates.
  • Patch deployment must follow the Change Management Policy and include testing in non-prod environments.
  • Automated patching is preferred where feasible.

9. Reporting & Metrics

  • Regular vulnerability reports must be shared with engineering leadership.
  • KPIs such as mean time to remediation (MTTR) and patch compliance rates must be tracked.

10. Exceptions

  • Exceptions must be formally documented, risk-accepted, and reviewed quarterly.

Subscribe to devsecopsbook

Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe