AIS-07: Are application security vulnerabilities remediated following defined processes?
Application security remediation should adhere to the following guidelines: a. Follow defined remediation processes, designed, tested, and implemented by security and application teams. b. Remediate risks as early in the SDLC as possible, such as during the design or development stages. c. Have defined roles and responsibilities, including escalation paths for application security incident response and remediation. d. Follow a risk-based approach to address high-risk incidents that significantly impact application availability, integrity, or confidentiality. e. Leverage automation when possible to increase remediation efficiency and accuracy.
Processes, roles, responsibilities, and documentation established for application security remediation should be reviewed periodically by management.
Example: • GitOps-based remediation of application vulnerabilities. • Automated remediation efficacy metric: total number of remediations of active critical/high vulnerabilities performed through Git for the given period. • Total number of active critical/ high vulnerabilities identified for the given period.
Control implemented
Control ownership
Description
Define and implement a process to remediate application security
vulnerabilities, automating remediation when possible.
Application Vulnerability Remediation
AIS-07: Is the remediation of application security vulnerabilities automated when
possible?
Application security remediation should adhere to the following guidelines: a. Follow defined remediation processes, designed, tested, and implemented by security and application teams. b. Remediate risks as early in the SDLC as possible, such as during the design or development stages. c. Have defined roles and responsibilities, including escalation paths for application security incident response and remediation. d. Follow a risk-based approach to address high-risk incidents that significantly impact application availability, integrity, or confidentiality. e. Leverage automation when possible to increase remediation efficiency and accuracy.
Processes, roles, responsibilities, and documentation established for application security remediation should be reviewed periodically by management.
Example: • GitOps-based remediation of application vulnerabilities. • Automated remediation efficacy metric: total number of remediations of active critical/high vulnerabilities performed through Git for the given period. • Total number of active critical/ high vulnerabilities identified for the given period.
Control implemented
Control ownership
Description
Define and implement a process to remediate application security
vulnerabilities, automating remediation when possible.