Vulnerability Management Policy - Korr
Purpose
This policy establishes requirements and guidelines for identifying, assessing, and remediating security vulnerabilities across Korr's AWS infrastructure. It aims to ensure timely remediation of vulnerabilities based on risk levels and maintain a strong security posture.
Scope
This policy applies to all AWS resources, including EC2 instances, containers, databases, and other cloud services used by Korr.
Policy Owner
The DevOps/Security team owns this policy and is responsible for its maintenance and enforcement.
Vulnerability Risk Levels and SLAs
Risk Level | Description | Remediation SLA |
---|---|---|
Critical | Vulnerabilities that pose immediate risk of system compromise or data breach | 30 days |
High | Vulnerabilities with significant security impact but no immediate exploit risk | 60 days |
Medium | Vulnerabilities that could be exploited under specific conditions | 90 days |
Low | Vulnerabilities with minimal security impact | 180 days |
Vulnerability Management Process
Detection
- Regular automated scanning using AWS Inspector
- Continuous monitoring via AWS GuardDuty
- Review of AWS Security Hub findings
- Monitoring of security advisories and CVE databases
Assessment
- Evaluate vulnerability severity and potential impact
- Determine risk level and corresponding SLA
- Consider business impact and remediation complexity
- Document findings and assigned risk levels
Remediation
- Prioritize fixes based on risk level and SLA
- Develop and test remediation plans
- Implement security patches and updates
- Validate fixes through follow-up scans
Reporting
- Track remediation progress against SLAs
- Document exceptions and compensating controls
- Generate monthly vulnerability status reports
- Review trends and recurring issues
Compliance Monitoring
- Regular audits of vulnerability management compliance
- Tracking of SLA adherence
- Documentation of exceptions and delays
- Monthly review of vulnerability metrics
- Quarterly assessment of policy effectiveness
This policy will be reviewed annually and updated as needed based on security requirements and industry best practices.
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article