Vulnerability Remediation (2024)

If a vulnerability scan identifies vulnerabilities in your unit, or you learn of new vulnerabilities, you are expected to remediate them.

Prioritize Based on Severity

Prioritize your remediation efforts based on the severity of the vulnerability and its potential impact on the confidentiality, integrity, or availability of the vulnerable system or data. Vulnerability severity is determined by the rating provided by the National Institute of Standards and Technology (NIST) Common Vulnerability Scoring System (CVSS).

Highest priority should be given to vulnerabilities rated Critical (CVSS 9-10) or High (CVSS 7-8.9).

Meet Remediation Timeframes

After a vulnerability is detected and a fix is available, the timeline for remediation begins.

  • Critical (CVSS 9-10) Vulnerabilities:
    • Create corrective action plan within two weeks.
    • Remediate vulnerability within one month.
  • High (CVSS 7-8.9) Vulnerabilities:
    • Create corrective action plan within one month.
    • Remediate vulnerability within three months.
  • Other Vulnerabilities:
    • Can be resolved based on availability of staff resources.

If there is an IA alert

If IA has issued an alert for a critical vulnerability, requirements specified within the alert supersede those above. Some critical vulnerabilities that pose a significant risk may require expedited timeframes for remediation. The IA alert will state when there is a need for accelerated action.

If there is a compliance requirement

Laws, regulations, standards, or contractual agreements may also dictate a higher priority and shorter timeline than the CVSS score alone indicates.

PCI. For example, to comply with the Payment Card Industry Data Security Standard (PCI DSS), vulnerabilities in any U-M PCI environment

  • with a CVSS score of 4 or higher must be remediated within 30 days of notification.
  • with scores lower than 4 must be remediated within two to three months.

Corrective Action Planning

Corrective action plans should:

  • Validate that the vulnerability is properly identified and prioritized.
  • Include action-oriented descriptions of the steps that will be taken to mitigate the vulnerability.
  • Ensure that appropriate resources are, or will be, available to remediate the vulnerability.
  • Identify milestones in the remediation process to fully address and resolve the vulnerability;
  • Ensure that the schedule for resolving the vulnerability is achievable and allows for appropriate testing.

Can't meet the expected remediation timeline? Contact IA (through the ITS Service Center) to discuss options and alternatives to ensure a safe IT environment in your unit.

Vulnerability Remediation (2024)
Top Articles
4 Quick Ways to Cook Bottom Round Steak Recipe for Economical Cut of Meat
Rice Flour Snickerdoodles Cookie Recipe
San Angelo, Texas: eine Oase für Kunstliebhaber
Tlc Africa Deaths 2021
Satyaprem Ki Katha review: Kartik Aaryan, Kiara Advani shine in this pure love story on a sensitive subject
Faint Citrine Lost Ark
Ross Dress For Less Hiring Near Me
Dr Lisa Jones Dvm Married
Barstool Sports Gif
Magic Mike's Last Dance Showtimes Near Marcus Cedar Creek Cinema
Joe Gorga Zodiac Sign
Nestle Paystub
Lantana Blocc Compton Crips
Maxpreps Field Hockey
R/Altfeet
Roster Resource Orioles
Paychex Pricing And Fees (2024 Guide)
Craigslist Free Stuff Merced Ca
Byui Calendar Fall 2023
Officialmilarosee
Maxpreps Field Hockey
Www.patientnotebook/Atic
Greenville Sc Greyhound
Avatar: The Way Of Water Showtimes Near Maya Pittsburg Cinemas
Mals Crazy Crab
2015 Kia Soul Serpentine Belt Diagram
Healthy Kaiserpermanente Org Sign On
Rush County Busted Newspaper
Landing Page Winn Dixie
Chicago Pd Rotten Tomatoes
Fbsm Greenville Sc
Xfinity Outage Map Lacey Wa
Jambus - Definition, Beispiele, Merkmale, Wirkung
Reli Stocktwits
Giantess Feet Deviantart
oklahoma city community "puppies" - craigslist
Cross-Border Share Swaps Made Easier Through Amendments to India’s Foreign Exchange Regulations - Transatlantic Law International
House Of Budz Michigan
Metra Schedule Ravinia To Chicago
Spn-523318
Sam's Club Gas Prices Deptford Nj
Clima De 10 Días Para 60120
Sand Castle Parents Guide
Weather In Allentown-Bethlehem-Easton Metropolitan Area 10 Days
Guided Practice Activities 5B-1 Answers
Sandra Sancc
Keci News
Aloha Kitchen Florence Menu
Used Sawmill For Sale - Craigslist Near Tennessee
All Buttons In Blox Fruits
Elvis Costello announces King Of America & Other Realms
Powah: Automating the Energizing Orb - EnigmaticaModpacks/Enigmatica6 GitHub Wiki
Latest Posts
Article information

Author: Nathanael Baumbach

Last Updated:

Views: 5693

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Nathanael Baumbach

Birthday: 1998-12-02

Address: Apt. 829 751 Glover View, West Orlando, IN 22436

Phone: +901025288581

Job: Internal IT Coordinator

Hobby: Gunsmithing, Motor sports, Flying, Skiing, Hooping, Lego building, Ice skating

Introduction: My name is Nathanael Baumbach, I am a fantastic, nice, victorious, brave, healthy, cute, glorious person who loves writing and wants to share my knowledge and understanding with you.