1. Purpose of This Guide
This guide helps you show that your organisation systematically identifies, prioritises, and fixes security weaknesses, using recognised industry standards. Bugs are normal, ignoring them is not.
This matters because you are expected to:
-
Enforce secure configurations (not defaults)
-
Use industry benchmarks (e.g. CIS, OWASP)
-
Regularly test systems for vulnerabilities
-
Remediate high-risk findings, not just document them
This artefact proves your vulnerability management is:
-
Intentional
-
Risk-based
-
Aligned with recognised security standards, not ad-hoc or reactive.
2. What You Will Submit
You will submit a documented Vulnerability Management Process, which explains how your organisation:
-
Identifies vulnerabilities across systems and applications
-
Uses industry standards to assess risk
-
Prioritises and remediates high-risk vulnerabilities
-
Verifies fixes after remediation
This is process and governance evidence, not raw scan output.
3. How to Collect / Obtain / Generate This Evidence
StrongKeep customers can adapt the provided template. Non-StrongKeep customers can follow the steps below:
Step 1: Define the Standards You Follow
Your document should clearly state that vulnerability management is aligned to recognised benchmarks, for example:
-
CIS Benchmarks for:
-
Desktops
-
Servers
-
Network devices
-
-
OWASP Top 10 for:
-
Web applications
-
APIs
-
-
Risk scoring based on:
-
CVSS scores
-
Vendor-provided severity ratings
-
Business impact
-
You do not need to implement every benchmark in full — you need to show alignment and intent.
Step 2: Explain How Vulnerabilities Are Identified
Describe how vulnerabilities are discovered, such as:
-
Automated vulnerability scanning
-
Security baseline analysis
-
Internet-facing scans (e.g. mail server / web server scans)
-
Penetration testing (periodic or before commissioning)
-
Vendor security advisories
This demonstrates that vulnerabilities are actively looked for, not passively discovered.
Step 3: Describe Risk Assessment and Prioritisation
Your process must explain how vulnerabilities are classified, including:
-
Risk ratings (e.g. Low / Medium / High)
-
Factors considered:
-
Severity (e.g. CVSS score)
-
Exposure (internet-facing vs internal)
-
Impact on availability, confidentiality, integrity
-
Key requirement:
High-risk vulnerabilities are explicitly prioritised for remediation.
Step 4: Define Remediation Expectations
Your document should clearly state that:
-
High-risk vulnerabilities must be remediated
-
Remediation methods may include:
-
Patching
-
Configuration hardening
-
Feature removal
-
Compensating controls
-
-
Fixes are applied:
-
Before production use (where applicable)
-
After major changes
-
On a periodic basis
-
This is a core requirement — auditors look for this explicitly.
Step 5: Verification and Follow-Up
Explain how fixes are confirmed, such as:
-
Re-scanning after remediation
-
Validation checks
-
Tracking status (open / mitigated / resolved)
Optional but strong:
-
Reference to a risk register
-
Reference to security testing reports
4. Evidence Format
Accepted file types
-
PDF
-
DOCX
Suggested naming format
YourCompanyName_VulnerabilityManagement_Process_Date
Example
AcmePteLtd_VulnerabilityManagement_Process_2025-07-01.pdf
5. What “Good” Looks Like
Your evidence is strong if it shows:
-
Visible element: Reference to CIS benchmarks and/or OWASP Top 10
Why it matters: Demonstrates industry-aligned secure configuration -
Visible element: Defined process for identifying vulnerabilities
Why it matters: Shows proactive security posture -
Visible element: Clear prioritisation of high-risk issues
Why it matters: Meets mandatory remediation expectations -
Visible element: Verification after fixes
Why it matters: Confirms vulnerabilities are actually resolved
6. Tips from Sir Stonk 🛡️
-
You don’t need perfect CIS compliance — you need reasonable, documented alignment.
-
Say the words “High-risk vulnerabilities are remediated.” Auditors look for that exact intent.
Secure configuration isn’t about being flawless.
It’s about knowing where the cracks are — and fixing the dangerous ones first.