Vulnerability Management SOP
Standard Operating Procedure for continuous vulnerability scanning, assessment, and remediation management
Service Pillar: Operate
Service Category: Managed Security
Engagement Type: Ongoing Monthly Retainer
Related Pricing: See Pricing & Positioning
Service Overview
Purpose
Provide continuous vulnerability identification, prioritization, remediation tracking, and risk reporting through systematic scanning, expert analysis, and actionable guidance to reduce organizational attack surface and maintain security posture.
Target Personas
| Persona |
Primary Pain Point |
Value Case |
| Solo IT Director |
No time for vulnerability management |
Managed scanning and prioritization |
| CFO/Controller |
Risk quantification for insurance |
Documented vulnerability posture |
| Healthcare Admin |
HIPAA requires regular scanning |
Compliance-ready vulnerability program |
Business Justification
Pricing Reference
| Tier |
Coverage |
Monthly Investment |
Per-Endpoint Option |
| Essential |
<100 endpoints, monthly scanning |
$2,500-$3,500/month |
$3-$5/endpoint |
| Standard |
100-500 endpoints, weekly scanning |
$4,000-$5,500/month |
$4-$6/endpoint |
| Enterprise |
500+ endpoints, continuous scanning |
$5,500-$8,000/month |
$3-$5/endpoint |
[BENCHMARK] Industry Pricing:
- Vulnerability Management: $1,000-$5,000/assessment (Tenable.io)
- Managed VM: $3/endpoint/month ongoing (Tenable.io)
- VM platforms: $2,000-$6,000/month for SMBs (Rapid7 InsightVM)
See Pricing & Positioning for complete pricing structure.
| Platform |
Strengths |
Best For |
| Tenable.io |
Industry leader, comprehensive coverage |
Enterprise, compliance-focused |
| Qualys VMDR |
Cloud-native, rapid deployment |
Cloud-heavy environments |
| Rapid7 InsightVM |
Strong remediation guidance |
IT-security collaboration |
| Microsoft Defender VM |
M365 integration |
Microsoft environments |
| Nessus Professional |
Cost-effective, flexible |
SMBs, consultancy use |
Scan Types
| Scan Type |
Coverage |
Frequency |
| Network Scan |
IP-based asset discovery |
Weekly-Monthly |
| Authenticated Scan |
Deep OS and app scanning |
Weekly |
| Agent-Based |
Continuous endpoint monitoring |
Real-time |
| Web Application |
OWASP Top 10, custom apps |
Weekly-Monthly |
| Cloud Configuration |
AWS, Azure, GCP misconfigs |
Daily |
| Container |
Image and runtime scanning |
CI/CD + Runtime |
Pre-Engagement
Onboarding Checklist
Technical Requirements
| Component |
Requirement |
Notes |
| Scanner Placement |
Network visibility to all assets |
May need multiple scanners |
| Credentials |
Service accounts for authenticated scans |
Least privilege |
| Firewall Rules |
Scanner communication allowed |
Port requirements vary |
| Agent Deployment |
Endpoint agents for real-time |
RMM or GPO deployment |
| Cloud Access |
API access for cloud scanning |
Read-only IAM roles |
Deployment Timeline
| Phase |
Duration |
Activities |
| Setup |
Week 1 |
Platform deployment, initial config |
| Discovery |
Week 2 |
Asset discovery, baseline scan |
| Tuning |
Weeks 2-3 |
Credential issues, false positives |
| Operationalize |
Week 4 |
Full program activation |
Service Delivery Framework
Vulnerability Management Lifecycle
┌─────────────────────────────────────────────────────────────────┐
│ VULNERABILITY MANAGEMENT LIFECYCLE │
├─────────────────────────────────────────────────────────────────┤
│ │
│ 1. DISCOVERY │
│ ├── Asset discovery and inventory │
│ ├── Classification (critical, high, standard) │
│ └── Coverage validation │
│ │
│ 2. SCANNING │
│ ├── Scheduled vulnerability scans │
│ ├── Authenticated and unauthenticated │
│ └── Web application and cloud scanning │
│ │
│ 3. ANALYSIS & PRIORITIZATION │
│ ├── CVSS scoring with context │
│ ├── Exploitability assessment (EPSS, KEV) │
│ ├── Asset criticality weighting │
│ └── Risk-based prioritization │
│ │
│ 4. REMEDIATION TRACKING │
│ ├── Ticket creation and assignment │
│ ├── Remediation guidance │
│ ├── SLA monitoring │
│ └── Exception management │
│ │
│ 5. VERIFICATION │
│ ├── Remediation validation scans │
│ ├── Regression testing │
│ └── Closure confirmation │
│ │
│ 6. REPORTING & METRICS │
│ ├── Executive dashboards │
│ ├── Compliance reports │
│ └── Trend analysis │
│ │
└─────────────────────────────────────────────────────────────────┘
Prioritization Framework
| Factor |
Weight |
Consideration |
| CVSS Score |
25% |
Base vulnerability severity |
| EPSS Score |
25% |
Probability of exploitation |
| KEV Status |
20% |
Known exploited vulnerability |
| Asset Criticality |
20% |
Business impact |
| Exposure |
10% |
Internet-facing vs. internal |
Risk Rating Calculation
| Combined Score |
Risk Rating |
Remediation SLA |
| 9.0-10.0 |
Critical |
72 hours |
| 7.0-8.9 |
High |
14 days |
| 4.0-6.9 |
Medium |
30 days |
| 0.1-3.9 |
Low |
90 days |
Operational Procedures
Scanning Schedule
| Scan Type |
Tier: Essential |
Tier: Standard |
Tier: Enterprise |
| Network Discovery |
Monthly |
Weekly |
Continuous |
| Vulnerability Scan |
Monthly |
Weekly |
Continuous |
| Credential Scan |
Monthly |
Weekly |
Continuous |
| Web App Scan |
Quarterly |
Monthly |
Weekly |
| Cloud Config |
Monthly |
Weekly |
Daily |
Daily Operations
| Task |
Description |
| Critical Alert Review |
Triage new critical findings |
| Scan Health Check |
Verify scans completing successfully |
| Credential Validation |
Monitor for auth failures |
| KEV Monitoring |
Check CISA KEV updates |
Weekly Operations
| Task |
Description |
| Scan Results Analysis |
Review all findings |
| Ticket Management |
Create/update remediation tickets |
| SLA Monitoring |
Track remediation progress |
| False Positive Review |
Validate reported FPs |
Monthly Operations
| Task |
Description |
| Executive Reporting |
Generate executive dashboard |
| Trend Analysis |
Track improvement over time |
| Coverage Assessment |
Identify scan gaps |
| Policy Review |
Update scan policies |
SLA Commitments
| Severity |
Remediation Target |
Escalation Point |
| Critical |
72 hours |
48 hours |
| High |
14 days |
10 days |
| Medium |
30 days |
21 days |
| Low |
90 days |
60 days |
Operational SLAs
| Metric |
Target |
Measurement |
| Scan Completion Rate |
95%+ |
Weekly |
| Asset Coverage |
98%+ |
Weekly |
| Critical Vuln Response |
<24 hours |
Per incident |
| Report Delivery |
Within 5 business days |
Monthly |
Deliverables
Real-Time Deliverables
| Deliverable |
Trigger |
Audience |
| Critical Alert |
Critical + KEV finding |
IT team |
| Emergency Patch Advisory |
Actively exploited |
IT team + management |
| Remediation Ticket |
New findings |
Asset owners |
Periodic Reports
| Report |
Frequency |
Content |
| Weekly Summary |
Weekly |
New findings, remediation progress |
| Monthly Executive |
Monthly |
Risk posture, trends, compliance |
| Quarterly Review |
Quarterly |
Strategic assessment, benchmarks |
| Annual Assessment |
Annually |
Year-over-year analysis |
Report Components
Monthly Executive Report:
1. Executive Summary
- Overall risk score
- Key metrics
- Notable improvements
2. Vulnerability Statistics
- Open vulnerabilities by severity
- New vs. closed
- Mean time to remediate
3. Remediation Status
- SLA compliance
- Top outstanding items
- Blocked items
4. Trend Analysis
- Month-over-month comparison
- Category breakdown
5. Compliance Status
- Framework requirements
- Audit readiness
6. Recommendations
- Priority actions
- Strategic improvements
Exception Management
Exception Process
| Step |
Description |
Approval |
| 1. Request |
Asset owner submits exception |
Ticket required |
| 2. Risk Assessment |
SBK evaluates risk |
Technical review |
| 3. Compensating Controls |
Alternative controls identified |
Documented |
| 4. Approval |
Client security leadership |
Sign-off required |
| 5. Documentation |
Exception recorded |
Tracking system |
| 6. Review |
Periodic reassessment |
Quarterly |
Exception Criteria
| Factor |
Consideration |
| Business Impact |
System criticality, downtime impact |
| Compensating Controls |
Alternative mitigations available |
| Exploit Probability |
Likelihood of exploitation |
| Time-Bound |
Planned remediation date |
| Documentation |
Risk acceptance documented |
Quality Assurance
Continuous Improvement
| Activity |
Frequency |
Purpose |
| Policy Tuning |
Monthly |
Reduce false positives |
| Credential Review |
Weekly |
Ensure scan depth |
| Coverage Analysis |
Monthly |
Identify gaps |
| SLA Review |
Quarterly |
Adjust targets |
Quality Checks
Integration with Other Services
Internal Service Integration
External Integrations
| Integration |
Purpose |
| SIEM |
Vulnerability-aware detection |
| Ticketing |
Automated remediation workflow |
| CMDB |
Asset context and ownership |
| Patch Management |
Remediation automation |
Evidence Base
Why This Approach Works
SBK Success Metrics
| Metric |
Target |
Measurement |
| Critical remediation SLA |
95%+ |
Monthly |
| Scan coverage |
98%+ |
Weekly |
| Client satisfaction |
4.5+/5.0 |
Quarterly survey |
| Year-over-year risk reduction |
25%+ |
Annual |
References
Last Updated: February 2026
Version: 1.0