Vulnerability Management: The Complete Guide for Security and Compliance Teams
2026-03-08
By Emre Salmanoglu

Vulnerability Management: The Complete Guide for Security and Compliance Teams

Learn how to build a vulnerability management programme that satisfies ISO 27001, SOC 2, NIS2, and DORA. Covers scanning, prioritisation, remediation SLAs, and audit evidence.

vulnerability management
vulnerability scanning
patch management
CVE
compliance

What Is Vulnerability Management?

Vulnerability management is the continuous, systematic process of identifying, evaluating, treating, and reporting security vulnerabilities across an organisation's technology estate. It transforms raw vulnerability data into actionable risk reduction.

A mature programme goes far beyond running a scanner — it encompasses asset discovery, risk-based prioritisation, remediation workflows, exception handling, metrics tracking, and compliance reporting.

The Vulnerability Management Lifecycle

PhaseActivitiesKey Outputs
1. Asset DiscoveryMaintain a complete, up-to-date inventory of all hardware, software, and cloud assetsAsset register with criticality ratings
2. Vulnerability IdentificationRun authenticated scans, review advisories, monitor threat feedsRaw vulnerability findings
3. PrioritisationScore by CVSS + asset criticality + exploitability + business contextPrioritised remediation queue
4. RemediationPatch, configure, upgrade, or apply compensating controlsClosed vulnerabilities, change records
5. VerificationRe-scan to confirm fixes, validate compensating controlsVerification evidence
6. ReportingDashboard metrics, trend analysis, compliance reportsManagement and audit reports
7. GovernancePolicy review, SLA adjustments, programme maturity assessmentUpdated policies, process improvements

Vulnerability Scoring and Prioritisation

CVSS Severity Levels

SeverityCVSS ScoreTypical Remediation SLAExamples
Critical9.0 – 10.024-72 hoursRemote code execution, authentication bypass
High7.0 – 8.97-14 daysPrivilege escalation, SQL injection
Medium4.0 – 6.930-60 daysCross-site scripting, information disclosure
Low0.1 – 3.990 daysMinor configuration issues, low-impact bugs
Informational0.0Best effortBest practice recommendations

Risk-Based Prioritisation

CVSS alone is insufficient. Combine these factors for effective prioritisation:

FactorDescriptionWeight
CVSS base scoreIntrinsic severity of the vulnerabilityBaseline
ExploitabilityDoes a known exploit exist? Is it actively exploited? (CISA KEV catalogue)High
Asset criticalityHow important is the affected system to the business?High
ExposureIs the asset internet-facing or internal-only?Medium
Data sensitivityWhat classification level of data does it handle?Medium
Compensating controlsAre there mitigating controls already in place?Adjusting

Scanning Types

Scan TypePurposeFrequencyTools
Network vulnerability scanDiscover known CVEs in OS and servicesWeekly minimumNessus, Qualys, Rapid7 InsightVM
Authenticated scanDeep scan with system credentials for accurate resultsWeeklySame as above, with credentials
Web application scan (DAST)Test running web apps for OWASP Top 10Per release + monthlyOWASP ZAP, Burp Suite, Acunetix
Static analysis (SAST)Analyse source code for vulnerabilitiesEvery commit (CI/CD)SonarQube, Checkmarx, Semgrep
Software composition analysis (SCA)Identify vulnerable open-source dependenciesEvery buildSnyk, Dependabot, Grype
Container image scanScan container images for known CVEsEvery build + registry scanTrivy, Grype, Prisma Cloud
Cloud configuration scanCheck cloud infrastructure for misconfigurationsContinuousCSPM tools, Prowler
Infrastructure as Code scanScan IaC templates before deploymentEvery commitCheckov, tfsec, KICS

Building a Vulnerability Management Programme

Essential Components

ComponentDescriptionMaturity Indicator
PolicyDocumented vulnerability management policy with scope, roles, SLAsApproved by management, reviewed annually
Asset inventoryComplete, classified inventory of all assetsAutomated discovery, updated continuously
Scanning coverageAll assets scanned on schedule>95% coverage, authenticated scans
Prioritisation frameworkRisk-based approach beyond raw CVSSContext-aware scoring with business input
Remediation workflowsTicketing integration, assignment, trackingAutomated ticket creation, SLA tracking
Exception managementFormal process for risk acceptanceDocumented, time-bounded, approved
Metrics and reportingKPIs tracked and reported to managementDashboard with trend analysis
Continuous improvementRegular programme reviews and maturity assessmentsAnnual maturity scoring

Key Metrics

MetricWhat It MeasuresTarget
Mean time to remediate (MTTR)Average days from discovery to fixCritical <3 days, High <14 days
Scan coverage% of assets scanned on schedule>95%
Vulnerability densityVulnerabilities per asset or per 1,000 lines of codeDecreasing trend
SLA compliance rate% of vulnerabilities fixed within SLA>90%
Overdue vulnerabilitiesCount of vulnerabilities past SLADecreasing trend
Risk exception countNumber of open risk exceptionsStable or decreasing
Recurrence rateVulnerabilities that reappear after fix<5%

Compliance Requirements

Framework Mapping

RequirementISO 27001SOC 2NIS2DORAPCI DSS
Vulnerability scanningA.8.8CC7.1Art. 21(2)(e)Art. 9(2)Req. 11.3
Patch managementA.8.8CC7.1Art. 21(2)(e)Art. 9(2)Req. 6.3.3
Risk-based prioritisationA.8.8CC3.2Art. 21(2)(a)Art. 9(1)Req. 6.3.1
Remediation trackingA.8.8CC7.2Art. 21(2)(e)Art. 9(2)Req. 11.3.3
Exception managementA.5.1CC3.2Art. 21(1)Art. 9(1)Req. 6.3.2
Reporting to managementA.5.1CC4.2Art. 20Art. 13Req. 12.4

Audit Evidence

Evidence TypeDescriptionFramework
Vulnerability management policyDocumented policy with SLAs and escalation pathsAll frameworks
Scan reportsRegular scan outputs showing coverage and findingsAll frameworks
Remediation ticketsJira/ServiceNow tickets with timestamps and statusISO 27001, SOC 2
SLA compliance reportsDashboard showing % fixed within SLAAll frameworks
Exception registerDocumented risk acceptances with approvalsAll frameworks
Trend reportsMonth-over-month vulnerability counts and MTTRSOC 2, NIS2
Penetration test resultsAnnual penetration testing validating controlsISO 27001, NIS2, DORA

Common Mistakes

MistakeImpactFix
Scanning without remediation workflowsAccumulating unfixed vulnerabilitiesIntegrate with ticketing, assign ownership
Treating all vulnerabilities equallyAlert fatigue, misallocated resourcesImplement risk-based prioritisation
Unauthenticated-only scansMissing 40-60% of vulnerabilitiesDeploy authenticated scanning
No asset inventoryUnknown scan gapsBuild and maintain automated asset discovery
Manual tracking in spreadsheetsAudit failures, lost visibilityUse a dedicated vulnerability management platform
Ignoring cloud and container workloadsGrowing blind spotsExtend scanning to cloud, containers, IaC
No defined SLAsNo accountability for remediationDocument and enforce severity-based SLAs

How Orbiq Supports Vulnerability Management

Orbiq helps you demonstrate vulnerability management controls to customers and auditors:

  • Evidence collection — Centralise scan reports, remediation tickets, and SLA metrics
  • Continuous monitoring — Track vulnerability management KPIs across your environment
  • Trust Center — Share your vulnerability management posture via your Trust Center
  • Compliance mapping — Map vulnerability management controls to ISO 27001, SOC 2, NIS2, and DORA requirements
  • Audit readiness — Pre-built evidence packages for auditor review

Further Reading