Lab 16: Vulnerability Management Program

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Design an enterprise vulnerability management programme

  • Calculate CVSS v3.1 scores (base/temporal/environmental)

  • Apply EPSS for risk-based prioritisation

  • Build SLA tiers and exception management workflow


Step 1: VM Programme Architecture

┌─────────────────────────────────────────────────────────┐
│              VULNERABILITY MANAGEMENT CYCLE              │
│                                                         │
│  DISCOVER      ASSESS       PRIORITISE     REMEDIATE    │
│  ┌────────┐  ┌─────────┐  ┌──────────┐  ┌──────────┐  │
│  │Asset   │  │Scan with│  │CVSS +    │  │Patch     │  │
│  │Inventory│→│Tenable/ │→│EPSS +    │→│deploy    │  │
│  │(CMDB)  │  │Qualys/  │  │Asset     │  │Config    │  │
│  │        │  │Rapid7   │  │criticality│  │change    │  │
│  └────────┘  └─────────┘  └──────────┘  └────┬─────┘  │
│                                               │         │
│  VERIFY                                REPORT │         │
│  ┌────────────────────────────┐  ┌────────────▼──────┐ │
│  │Rescan after patch/fix      │  │KPIs, SLA tracking,│ │
│  │Validate remediation        │  │board metrics      │ │
│  └────────────────────────────┘  └───────────────────┘ │
└─────────────────────────────────────────────────────────┘

Step 2: CVSS v3.1 Score Calculator + EPSS Prioritisation

📸 Verified Output:


Step 3: CVSS v3.1 Metrics Explained

Base Metrics:

Exploitability:

Metric
Values
Description

Attack Vector (AV)

N/A/L/P

Network → Adjacent → Local → Physical

Attack Complexity (AC)

L/H

Low/High conditions to exploit

Privileges Required (PR)

N/L/H

None/Low/High privileges needed

User Interaction (UI)

N/R

None/Required

Impact (C/I/A):

Value
Score
Description

None (N)

0

No impact

Low (L)

0.22

Limited

High (H)

0.56

Total loss

Severity ratings:

Score
Rating

0.0

None

0.1–3.9

Low

4.0–6.9

Medium

7.0–8.9

High

9.0–10.0

Critical

💡 CVSS alone is insufficient for prioritisation — EPSS (Exploit Prediction Scoring System) adds exploitation probability. A CVSS 7.5 with EPSS 0.85 is higher priority than CVSS 9.0 with EPSS 0.02 (theoretical exploit, never seen in wild).


Step 4: EPSS — Exploit Prediction Scoring System

EPSS v3 (current):

  • Scores 0.0–1.0: probability of exploitation in the wild within 30 days

  • Updated daily based on threat intel feeds

  • High EPSS = active exploitation observed

Prioritisation matrix:

CVSS Score
EPSS Score
Priority
SLA

≥ 9.0

≥ 0.5

P1-CRITICAL

24 hours

≥ 7.0

≥ 0.5

P1-HIGH

7 days

≥ 9.0

< 0.5

P2-HIGH

7 days

≥ 7.0

< 0.5

P3-MEDIUM

30 days

4.0–6.9

Any

P4-MEDIUM

30–90 days

< 4.0

Any

P5-LOW

90 days

CISA KEV (Known Exploited Vulnerabilities):

  • CISA maintains KEV catalogue of actively exploited CVEs

  • Federal agencies: must patch KEV within 2-3 weeks

  • Best practice: treat all KEV as P1 regardless of CVSS


Step 5: Asset Inventory and CMDB Integration

CMDB attributes for VM:

Environmental CVSS adjustment:


Step 6: SLA Tiers and Exception Management

SLA tiers:

Priority
CVSS Range
Typical EPSS
SLA
Owner

P1 Critical

≥ 9.0

High

24 hours

Security + IT

P2 High

7.0–8.9

Any

7 days

IT Operations

P3 Medium

4.0–6.9

Any

30 days

System owners

P4 Low

0.1–3.9

Any

90 days

System owners

Exception management process:


Step 7: VM Programme Metrics

Key KPIs:

KPI
Definition
Target

Mean Time to Patch (MTTP)

Avg days from CVE disclosure to patch

Critical: < 1d, High: < 7d

Patch compliance rate

% assets patched within SLA

> 95%

Vulnerability density

Critical CVEs per 100 assets

< 5

Scan coverage

% assets scanned in last 7 days

> 98%

Exception backlog

Open exceptions past deadline

0

Repeat findings

Findings from last audit still open

< 10%

Reporting cadence:

  • Daily: Critical CVEs discovered; patches applied

  • Weekly: SLA compliance by team; overdue items

  • Monthly: Executive dashboard; trend analysis

  • Quarterly: Board risk report; programme maturity


Step 8: Capstone — Enterprise VM Programme Design

Scenario: 15,000-asset estate across 3 regions; PCI DSS + ISO 27001


Summary

Concept
Key Points

CVSS v3.1

Base score from exploitability + impact metrics

EPSS

Exploitation probability in 30 days; 0.0-1.0 scale

CISA KEV

Actively exploited; treat as P1 regardless of CVSS

SLA tiers

Critical 24h, High 7d, Medium 30d, Low 90d

Environmental CVSS

Adjust score based on asset criticality/exposure

Exception process

Approve + compensating controls + expiry + track

CMDB integration

Asset criticality feeds into prioritisation engine

Last updated