What is the vulnerability remediation timeline you have adopted for CVSS >= 7.0 vulnerabilities which are only exposed to your Intranet users (not Internet)?

Between 6-12 months14%

Between 3-6 months28%

Between 2-3 months19%

Between 1-2 months14%

Between 2 weeks to 1 month12%

Between 1-2 weeks4%

Between 0-1 week6%

lock icon

Please join or sign in to view more content.

1007 PARTICIPANTS
5.1k views3 Upvotes3 Comments
Sort By:
Oldest
Senior Security and Compliance Auditor in Software5 years ago
7.0 hits my High rating (Medium tops off at 6.9) so it would need to be fully resolved within 30 days (Medium 60 days).  I use the CVSS score as a starting point and then score to my organization so it may lower/raise the score based on a number of risk factors, including Intranet only.
1
CTO in Software5 years ago
CVSS is a great start, but it lacks context. Here's a few questions to start with evaluating the remediation timeline:

1. Who has access to this vulnerable System? 3rd Party/Contractors? Everyone in The Company? A few Employees?

2. Is accessing the System requires going through VPN or MFA? Is there an audit trail?

3. Are there any Security Controllers deployed before one gets an access this System?

4. Are there any Security Controllers deployed on the System, in case it gets comprised?

5. Is this System contains sensitive data? Can Data be leaked from it?

Validating those points (and more), will help establish a more realistic, breach-oriented approach to the problem at hand.
6
CIO in Finance (non-banking)4 years ago
Cvss is inadequate. I suggest focus on exploitable vulnerabilities and having capacity to remediate new vulnerabilities that show up in the wild. Monitor aging of exploitables and keep those under 60 days.
1

Content you might like

TCO19%

Pricing26%

Integrations21%

Alignment with Cloud Provider7%

Security10%

Alignment with Existing IT Skills4%

Product / Feature Set7%

Vendor Relationship / Reputation

Other (comment)

View Results
5.7k views3 Upvotes1 Comment
Director of IT in IT Services4 days ago
Implementation of Zero trust architecture, its modules across the organisation is a priority for us. So, we will be implementing zero trust strategies in IAM, inline with overall strategy.
1.4k views1 Comment
Head of Enterprise Architecture MERCK Group in Healthcare and Biotecha year ago
Strategy & Architecture
Read More Comments
39k views5 Upvotes34 Comments

Yes79%

No20%

1.2k views