3.7: Utilize a Risk-Rating Process

Utilize a risk-rating process to prioritize the remediation of discovered vulnerabilities.

Asset Type

Security Function

Implementation Groups

Applications

Respond

2, 3

Dependencies

  • None

Inputs

  1. Security program vulnerability management policy

Operations

  1. Review vulnerability management policy for risk-rating process description

  2. Review risk-rating process description to ensure risk-rating is used for prioritization

Measures

  • M1 (Boolean) = Risk-rating process exists or does not exist

  • M2 (Boolean) = Risk-rating process is used for prioritization

Metrics

Risk-Rating Process

Metric

Manual review: Does a risk-rating process exist and is it utilized for prioritization?

Calculation

M1 AND M2