Setting practical time frames to remedy security vulnerabilities

Padlock - security management
(Image credit: Shutterstock)

Cybersecurity and risk leaders should tie vulnerability management practices to their organization's specific needs, not a mythical standard.

While patching all the Windows systems at a large international bank in three days is technically possible, the subsequent business disruption would most likely make this an unviable solution.

About the author

Craig Lawson is a Research Vice President with Gartner.

The question then becomes, what is a realistic time frame for fixing and addressing security vulnerabilities?

A Swiss bank, a UK retailer, and a Chinese government agency would each have vastly different answers – as the threat landscape is completely different for each individual organization.

Unfortunately, the recognized “industry standard” for vulnerability remediation time frames rarely account for organization-specific constraints, technology cohabitation considerations, internal policies or external compliance requirements.

The reality is far more nuanced.

What’s important is turning ‘whether a platform gets patched’ into ‘whether the specific risk of platform vulnerability has been sufficiently mitigated’.

To achieve this, organizations must take a more structured risk- and fact-based approach to vulnerability management as part of an overall security program.

How fast is fast enough in vulnerability management?

The volume of reported vulnerabilities, alone, means that organizations are challenged to address and amend them in a suitable, timely manner.

Based on how quickly vulnerabilities can be exploited, organizations need to be equipped to implement emergency remediation on key systems within hours of a vendor releasing a patch to address a vulnerability – in addition to investing heavily in mitigation measures. Refining their remediation process maturity is also essential to achieving nonemergency remediation across all system types within a matter of weeks, instead of months or years.

Four best practices can operationalize effective remediation time frames:

1. Align vulnerability management to risk appetite

Organizations have a ceiling for the speed with which they can patch or compensate for vulnerabilities. This upper limit is driven by each company’s appetite for operational risk, IT operational capacity/capabilities and capacity to absorb disruption when trying to remediate vulnerable technology platforms.

Security leaders can align vulnerability management practices to their organization's needs and requirements by evaluating specific use cases, measuring operational risk appetite for particular risks or on a risk-by-risk basis, and determining remediation abilities and limitations.

2. Prioritize vulnerabilities based on risk

Organizations must apply comprehensive, risk-based vulnerability prioritization, based on considerations such as the severity of the vulnerability, current exploitation activity, business criticality and exposure of the affected system.

One of the biggest changes you can make is to focus on the vulnerabilities that are being exploited in the wild. That should be the number one goal and will ensure the biggest risks are tackled quickly and efficiently.

3. Combine compensating controls and remediation solutions

Companies can reduce their attack surface more efficiently while having less operational impact on the organization by merging compensating controls that can achieve virtual patching – such as intrusion detection and prevention systems, and web application firewalls with remediation solutions like patch management tools. Newer technologies, including breach and attack simulation (BAS) tools, can also offer insight into how your current security technologies are configured and whether they are capable of protecting you against a variety of threats similar to ransomware.

It is simply unfeasible to patch a system if the supplier hasn’t yet provided a patch, and the system is no longer supported for other reasons like software compatibility. It is important to note that highly regulated industries often have mandates which can limit your ability to perform functions such as patching.

Patching isn’t everything, though: it is hard, it can break things, and it takes time. It is important therefore to have a plan B - you need more arrows in your quiver than just patching.

If you do a better job with your vulnerability management program, you can reduce your attack surface substantially. This allows you to present a harder target for a threat actor trying to gain leverage inside your environment. That is why it is so important.

4. Use technologies to automate vulnerability analysis

By employing technologies that can automate vulnerability analysis, you can improve remediation windows and efficiency.

It is also essential to evaluate your current vulnerability assessment solutions and ensure they support more recent types of assets like cloud, containers and cyber-physical systems in your environment. If not, augment or replace the solution.

Craig Lawson is a Research Vice President with Gartner.

Read more
Hacker Typing
Racing against time on a menacing caldera: survey finds majority of organizations take days to tackle critical vulnerabilities, each of them a potential open goal for cybercriminals
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Holographic representation of cloud computing over open businessman's hand
Businesses are struggling to address vulnerabilities hidden in phantom dependencies
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
Concept art representing cybersecurity principles
What businesses need for modern third-party risk management
A stylized depiction of a padlocked WiFi symbol sitting in the centre of an interlocking vault.
The importance of understanding your minimum viable operations
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)