Critical and high vulnerabilities are remediated within defined SLAs
Vulnerability management without SLAs is just a list of problems nobody is accountable to fix. SLAs convert scan findings into commitments: critical vulnerabilities are remediated within a defined window, high findings within a longer window, and so on. Without defined and tracked SLAs, critical findings can sit open for months while teams focus on other work. SLAs need to be realistic, enforced, and reported on to have any effect.
Implementation steps
- 1
Define written SLAs for each vulnerability severity tier
Document remediation SLAs by CVSS severity or your internal risk tier. Common targets are: critical within 15 days, high within 30 days, medium within 90 days, low within 180 days. Adjust for context: internet-facing critical systems should have tighter timelines. Get SLAs approved by engineering leadership and publish them in your security policy.
confluence notion drata vanta google-docs - 2
Automate ticket creation and SLA tracking for scan findings
Configure your vulnerability scanner to create tickets automatically in your issue tracker when new findings are detected. Assign each ticket an owner based on the affected system's team. Set due dates based on the SLA. Configure alerts when tickets are approaching or past their SLA deadline. Do not rely on manual ticket creation.
tenable qualys jira servicenow linear - 3
Report SLA compliance to leadership monthly
Produce a monthly report showing the number of open findings by severity, the percentage closed within SLA, and any exceptions. Share this report with engineering and security leadership. Use it to identify chronic offenders, typically specific teams or system types that consistently miss deadlines, and address the root cause.
tenable qualys drata tableau google-sheets
Evidence required
SLA policy and compliance metrics
Evidence that written SLAs exist and that compliance is being tracked and reported.
- - Written vulnerability remediation SLA policy with timelines by severity
- - Ticket tracker showing open findings with SLA due dates
- - Monthly SLA compliance report showing percentage remediated on time
Related controls
Vulnerability scanning is performed regularly on all systems
Vulnerability Management
CISA Known Exploited Vulnerabilities are remediated on priority timelines
Vulnerability Management
Internet-exposed attack surface is identified and minimized
Vulnerability Management
Penetration testing or red team exercises are conducted at least annually
Vulnerability Management