Copyright (c) 2026 MindMesh Academy. All rights reserved. This content is proprietary and may not be reproduced or distributed without permission.

7.3.2. Remediation Tracking and Exception Handling

💡 First Principle: Finding vulnerabilities without tracking their remediation is security theater — you have identified risk but not reduced it. A mature vulnerability management program requires a closed-loop process: discover → prioritize → assign → remediate → verify → close. Without the verify and close steps, you cannot demonstrate that remediation actually occurred, and without tracking timelines, you cannot hold teams accountable to risk-based SLAs.

Remediation SLA framework:

Organizations define remediation timelines based on severity, adjusting for asset criticality and exposure:

SeverityTypical SLA (Internet-Facing)Typical SLA (Internal)Escalation Trigger
Critical24–72 hours7 daysAuto-escalate to CISO at SLA breach
High7–14 days30 daysManager notification at 50% SLA elapsed
Medium30–60 days90 daysMonthly reporting; exception if beyond 90
Low90–180 daysNext maintenance cycleTracking only
Exception handling and risk acceptance:

Not every vulnerability can be remediated immediately — some cannot be patched without breaking production, some affect legacy systems with no vendor support, and some require architectural changes that take months. The exception process provides a governed path for accepting residual risk:

  1. Risk acceptance request — System owner documents why remediation cannot occur within SLA, the compensating controls in place, and the residual risk.
  2. Risk review — Security team evaluates whether compensating controls adequately reduce risk and whether the proposed timeline is reasonable.
  3. Approval authority — Risk acceptance requires approval at a level commensurate with the risk. Critical risks typically require CISO or executive approval; medium risks may be approved by the asset owner's director.
  4. Time-bound revalidation — Every exception expires. Common practice: 90-day revalidation for critical, 180-day for high. At revalidation, either the vulnerability is remediated, the exception is renewed with fresh justification, or the risk acceptance is revoked and remediation becomes mandatory.
  5. Audit trail — Every exception decision is documented for audit evidence. Regulators and auditors expect to see a governed exception process, not ad-hoc decisions.
Vulnerability disclosure — responsible coordination:

When your organization discovers a vulnerability in a third-party product, or when a researcher discovers one in yours, a disclosure process governs the communication:

Disclosure ModelHow It WorksRisk Profile
Coordinated (responsible)Discoverer notifies vendor privately; vendor patches; public disclosure after patch availableLowest risk — patch available before exploit public
Full disclosureDiscoverer publishes immediately with no vendor notificationHigh risk — attackers get exploit details before patch exists
Bug bountyVendor pays researchers for reported vulnerabilitiesModerate — incentivizes research but requires triage capacity
CVE assignmentMITRE assigns unique identifier; enables tracking across industryEssential for cross-vendor remediation tracking

Common Vulnerabilities and Exposures (CVE): The CVE system provides a standardized identifier for publicly known vulnerabilities. CVE IDs (e.g., CVE-2024-3094 for the XZ Utils backdoor) enable unambiguous communication across vendors, scanners, and security teams. The National Vulnerability Database (NVD) enriches CVEs with CVSS scores, affected product lists, and reference links.

⚠️ Exam Trap: Risk acceptance is not risk ignorance. Accepting risk without documented justification, compensating controls, and executive approval is simply ignoring the vulnerability. The exam tests whether you understand the governance structure required for legitimate risk acceptance versus informal decisions to defer patching.

Reflection Question: A vulnerability scan reveals a critical RCE vulnerability in a production ERP system that processes payroll for 5,000 employees. The vendor has released a patch, but the system owner reports that applying the patch requires a 12-hour maintenance window and full regression testing — a process that cannot be scheduled for six weeks. Describe the exception process, the compensating controls you would require during the gap, and the approval authority needed for this risk acceptance.

Alvin Varughese
Written byAlvin Varughese
Founder15 professional certifications