TVM-03: Are processes, procedures, and technical measures defined, implemented, and
evaluated to enable scheduled and emergency responses to vulnerability identifications
(based on the identified risk)?
An integrated TVM system should be implemented that can maintain records of threats and vulnerabilities found over time and the result of their mitigation actions. The Integrated TVM system should be used to mitigate all future risks, by leveraging the previous experiences of the mitigation activities.
A full remediation schedule should be considered. The schedule should classify and prioritize vulnerabilities in order of their severity and threat to the environment, aligned to the expectations of TVM Policy.
Vulnerability remediation schedules should be approved and communicated to all relevant stakeholders (and included in SLA's).
Control implemented
Control ownership
Description
Define, implement and evaluate processes, procedures and technical
measures to enable both scheduled and emergency responses to vulnerability identifications,
based on the identified risk.