⌂ Home

Vulnerability Management Lifecycle

From noisy scanner output to measured risk reduction.

The lifecycle

Loop continuously—each deploy and dependency change re-enters discovery. Tip: click a stage to highlight it.

Vulnerability databases

SourcePurpose
NVDU.S. government repository of CVE analysis and CVSS
CVE ListStandard identifiers for publicly known vulnerabilities
GHSAGitHub Security Advisories for open-source ecosystems

CVSS scoring (conceptual)

The Common Vulnerability Scoring System (CVSS) produces a 0–10 severity from metrics like attack vector, complexity, privileges required, user interaction, and impacts to confidentiality, integrity, and availability. v3.x uses Base, Temporal, and Environmental scores—teams often tune with environmental modifiers for their own exposure.

BaseIntrinsic severity of the flaw
TemporalExploit code maturity, report confidence
EnvironmentalAsset value, mitigations in your context

Note CVSS alone should not be the only prioritization input—combine with business impact and threat intelligence.

Secure coding techniques

Tools and automation

CategoryExamplesRole in lifecycle
AggregationDefectDojo, Kenna, ASOC platformsDeduplicate findings across scanners
TicketingJira, Azure DevOps, GitHub ProjectsSLAs, ownership, traceability to commits
Policy enginesOPA, cloud policy gatesBlock deploy on critical unapproved risk
SBOMCycloneDX, SPDX toolsFaster impact analysis when CVE drops
# Example: fail CI if critical CVEs in container scan (pseudo-policy)
# if critical_count > 0 and exception_id is null → exit 1