16.6
IG2 IG3

Establish and Maintain a Severity Rating System and Process for Application Vulnerabilities

Asset Type: Applications
Security Function: Protect

Description

Establish and maintain a severity rating system and process for application vulnerabilities that facilitates prioritizing the order in which discovered vulnerabilities are fixed. This process includes setting a minimum level of security acceptability for releasing code or applications. Severity ratings bring a systematic way of triaging vulnerabilities that improves risk management and helps ensure the most severe bugs are fixed first. Review and update the system and process annually.

Implementation Checklist

1
Assess current protection controls in place
2
Configure and deploy required security controls
3
Test control effectiveness in non-production environment
4
Deploy to production and verify functionality
5
Document configuration and operational procedures
6
Select and configure vulnerability scanning tool
7
Define scan scope, frequency, and credentials
8
Establish vulnerability remediation SLAs by severity
9
Create exception/waiver process for unremediated findings
10
Draft policy/procedure document
11
Obtain stakeholder review and approval
12
Communicate to affected personnel
13
Schedule periodic review and updates

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Critical Vulnerability Deprioritized Without Severity Framework

Integrity

A critical remote code execution vulnerability in a customer-facing application is treated with the same urgency as a minor cosmetic bug because no severity rating system exists to prioritize remediation.

Low-Severity Vulnerabilities Consume Resources While Critical Flaws Persist

Confidentiality

Development teams spend time fixing low-impact vulnerabilities while critical security flaws in production applications remain unpatched because no prioritization framework guides remediation ordering.

Vulnerabilities (When Safeguard Absent)

No Vulnerability Severity Rating System

Without a severity rating system, all vulnerabilities are treated equally, preventing the organization from directing remediation resources toward the most critical and exploitable flaws first.

No Minimum Security Acceptability Threshold for Releases

Absence of a minimum security bar means applications can be released to production with unresolved critical vulnerabilities because there is no defined standard preventing it.

Evidence Requirements

Type Evidence Item Collection Frequency
Technical Configuration screenshots or exports showing protection controls enabled Captured quarterly
Document Procedure documentation for protection measures Reviewed annually
Technical Vulnerability scan reports showing scope and findings Per scan cycle
Record Vulnerability remediation tracking with SLA compliance metrics Monthly
Document Governing policy document (current, approved, communicated) Reviewed annually