Application security remediation should adhere to the following guidelines:
a. Follow defined remediation processes, designed, tested, and implemented by security and application teams.
b. Remediate risks as early in the SDLC as possible, such as during the design or development stages.
c. Have defined roles and responsibilities, including escalation paths for application security incident response and remediation.
d. Follow a risk-based approach to address high-risk incidents that significantly impact application availability, integrity, or confidentiality.
e. Leverage automation when possible to increase remediation efficiency and accuracy.
Processes, roles, responsibilities, and documentation established for application security remediation should be reviewed periodically by management.
Example:
• GitOps-based remediation of application vulnerabilities.
• Automated remediation efficacy metric: total number of remediations of active critical/high vulnerabilities performed through Git for the given period.
• Total number of active critical/ high vulnerabilities identified for the given period.
Define and implement a process to remediate application security vulnerabilities, automating remediation when possible.
Application security remediation should adhere to the following guidelines:
a. Follow defined remediation processes, designed, tested, and implemented by security and application teams.
b. Remediate risks as early in the SDLC as possible, such as during the design or development stages.
c. Have defined roles and responsibilities, including escalation paths for application security incident response and remediation.
d. Follow a risk-based approach to address high-risk incidents that significantly impact application availability, integrity, or confidentiality.
e. Leverage automation when possible to increase remediation efficiency and accuracy.
Processes, roles, responsibilities, and documentation established for application security remediation should be reviewed periodically by management.
Example:
• GitOps-based remediation of application vulnerabilities.
• Automated remediation efficacy metric: total number of remediations of active critical/high vulnerabilities performed through Git for the given period.
• Total number of active critical/ high vulnerabilities identified for the given period.
Define and implement a process to remediate application security vulnerabilities, automating remediation when possible.