What steps can be taken?
- Establish vulnerability and patch management policies and procedures that align with both business priorities and industry best practices. Having clear policies that dictate how to respond to new vulnerabilities makes remediation faster and easier.
- When possible, invest in tools that allow for automated detection of assets and the vulnerabilities and/or issues that may impact them.
- Develop a robust asset inventory of not only the proprietary software within your environment, but also understand the open-source dependencies that may exist within your applications. Leveraging software bills of material (SBOMs) can help identify what open-source components may be critical to your operations and allow you to act quickly should a new vulnerability arise.
- Whenever possible, allowing auto-updates to software can help address vulnerabilities as quickly as possible. If testing is required to ensure the update will not disrupt operations, conduct the testing as quickly as possible.
- The number of vulnerabilities released annually can be daunting, with over 25,000 vulnerabilities published in 2022. Prioritizing patching those vulnerabilities by both their severity and the presence of active exploitation by threat actors. To assist in this, the United States Cybersecurity and Infrastructure Security Agency (CISA) maintains a catalog of known exploited vulnerabilities and updates this list regularly (the catalog can be found here). The list is free and available to the public and can serve as a key resource in helping to prioritize patching based on real-world threats. Also, the Forum of Incident Response and Security Teams (FIRST) has produced an Exploit Prediction Scoring System (EPSS) that can also help prioritize remediation based on the likelihood of exploitation.
- The development of a custom prioritization methodology can also greatly assist in responding quickly and appropriately to new vulnerabilities. This model would be dependent upon a mix of external elements, such as a vulnerability’s CVSS score and evidence of active exploitation, as well as internal elements such as whether or not the impacted assets are critical and/or externally facing.
- Establish clear policies for updating BYOD devices and communicate those expectations to employees. Highlight new vulnerabilities that may affect these devices (including cell phones or home computers) to employees so that they can patch them promptly.


