Vulnerability Management Policy
Purpose
The purpose of this policy is to inform all DefectDojo employees and external parties with access to DefectDojo equipment, systems, or networks (DefectDojo Staff) of their obligations with regards to the Vulnerability Management of all systems, networks, and IT assets for which they are assigned ownership and maintenance.
Scope
Vulnerability and patch management as applied to information security and the confidentiality, integrity, and availability of company-owned, processed, stored, and transmitted information.
Compliance
Compliance Measurement
The Information Security Management team will verify compliance to this document through various methods, including but not limited to business tool reports, internal and external audits, and feedback to the document owner.
Exceptions
Any exception to the policy must be reviewed and approved in advance by the Management Review Team.
Non-Compliance
Any DefectDojo Staff found to have violated this document may be subject to disciplinary action, up to and including termination of employment.
Continual Improvement
This document is updated and reviewed as part of the continual improvement process.
Requirements
Remediation Timeline and Scope
All Production and Internet-facing systems, including both infrastructure and applications, must be scanned and patched in accordance with the criticality and remediation timelines outlined in this document.
Vulnerability and Misconfiguration Scanning
Vulnerability scanning must be automated and should include misconfiguration detection wherever possible. Vulnerability and misconfiguration scanning must be done at least weekly.
Vulnerability Criticality Score
DefectDojo Staff will apply criticality to technical vulnerabilities in accordance with the most current NIST guidelines and the most recent CVSS version (currently 3.0):
- Low: 0.1–3.9
- Medium: 4.0–6.9
- High: 7.0–8.9
- Critical: 9.0–10.0
Vulnerability Discovery and Triage Timelines
- Medium and higher vulnerabilities must be triaged within 7 days of discovery.
- Emergency vulnerabilities (e.g., Log4J) must be triaged within 24 hours.
Patching Timelines
Remediation from patch release or discovery date, according to severity:
- Low: 90 days
- Medium: 30 days
- High: 7 days
- Critical: 3 days if testing is required, otherwise 1 day
Configuration Correction Timelines
DefectDojo Staff must remediate configuration or entitlement weaknesses for IaC, IaaS, IAM, and SaaS:
- Low: 30 days
- Medium: 15 days
- High: 7 days
- Critical: 1 day
Exceptions may be granted if fixes impact business operations, with compensating controls and a documented plan.
Attack Surface and Infrastructure Correction Timelines
Remediation of infrastructure and perimeter findings:
- Low: 20 days
- Medium: 10 days
- High: 5 days unless it breaks access or transport
- Critical: 1 day unless it breaks access or transport
Risk exceptions may be granted with compensating controls and a plan to correct issues.
Remediation Principles
Escalation and De-escalation of Vulnerabilities
The Security Operations team may adjust the criticality of any vulnerability as appropriate.
Emergency-Rated Vulnerabilities
Emergency-rated vulnerabilities must be patched within 24 hours or as soon as feasible and managed per the Incident Response Policy.
Vulnerability Assessments
- Technical vulnerability assessments are conducted prior to production deployment.
- Quarterly automated vulnerability scans are conducted for all production environments.
- No intrusive scans are conducted on systems not under DefectDojo authority without explicit permission.
End-of-Life (EOL) Systems
EOL systems must be replaced with the latest major versions without undue delay.
Patching Prioritization
Phased rollout of patches must prioritize higher-risk systems.
Patching Deployment and Change Management
- All patches must be tested prior to deployment.
- Customer environment uptime must be maintained per SLA.
- Patch deployment should follow Change Management Policy where feasible.
Relevant Documents
- Incident Management Policy
- Change Management Policy