Vulnerability Management Process
Vulnerability Management Process
Revision 2
December 30, 2021
Approval
Bo Berlas
GSA Chief Information Security Officer
Contact: GSA Office of the Chief Information Security Officer (OCISO), Policy and Compliance
Division (ISP) at [email protected].
Table of Contents
1 Introduction ............................................................................................................................... 1
1.1 Purpose .......................................................................................................................................... 1
1.2 Scope.............................................................................................................................................. 1
1.3 Policy .............................................................................................................................................. 1
1.4 References ..................................................................................................................................... 3
2 Roles and Responsibilities ........................................................................................................... 3
2.1 Authorizing Officials (AOs) ............................................................................................................. 3
2.2 Information Systems Security Managers (ISSMs) .......................................................................... 4
2.3 Information Systems Security Officers (ISSOs) .............................................................................. 4
2.4 System Owners (SOs) ..................................................................................................................... 4
2.5 Custodians...................................................................................................................................... 5
2.6 System/Network Administrators ................................................................................................... 5
2.7 GSA SecOps Scanning Team Members .......................................................................................... 5
3 GSA General Vulnerability Management Procedures.................................................................... 5
3.1 Implementation of NIST Controls .................................................................................................. 5
3.2 Adherence to Federal Laws, Regulations, Directives, and Guidance ............................................ 6
3.2.1 DHS CISA Cybersecurity Directives ..................................................................................... 7
3.2.2 BOD 18-01 – Enhance Email and Web Security .................................................................. 7
3.2.3 BOD 19-02 - DHS Cyber Hygiene Scanning Program........................................................... 7
3.2.4 BOD 20-01 - Develop and Publish a Vulnerability Disclosure Policy................................... 8
3.2.5 BOD 22-01 - Reducing the Significant Risk of Known Exploited Vulnerabilities ................. 8
4 Vulnerability Management.......................................................................................................... 8
4.1 GSA Scanning Capabilities .............................................................................................................. 8
4.2 Vulnerability Scanning Process ...................................................................................................... 9
4.2.1 Inventory Updates by ISSOs ................................................................................................ 9
4.2.2 Scanning Tool Updates ....................................................................................................... 9
4.2.3 Performing Vulnerability Scans ......................................................................................... 10
4.2.4 Scan Issue Mitigation ........................................................................................................ 12
4.3 Vulnerability Scan Reports ........................................................................................................... 12
4.3.1 General Reports ................................................................................................................ 12
4.3.2 Executive Reports ............................................................................................................. 12
4.3.3 Ad Hoc Reports ................................................................................................................. 13
4.3.4 Documenting Report Reviews .......................................................................................... 13
4.4 Remediation Verification ............................................................................................................. 13
4.5 Re-Classification/Recasting of Known Vulnerabilities ................................................................. 14
4.6 False-Positive Handling ................................................................................................................ 14
5 Configuration Settings Management (CSM) ............................................................................... 15
5.1 CSM Scanning............................................................................................................................... 15
5.2 CSM Reporting ............................................................................................................................. 15
5.2.1 BigFix Compliance Portal .................................................................................................. 15
5.3 CSM Deviations ............................................................................................................................ 16
5.4 CSM Accounting, Compliance and Reporting .............................................................................. 16
5.4.1 CSM Accounting ................................................................................................................ 16
5.4.2 CSM Compliance Reporting .............................................................................................. 17
List of Tables
Table 4-1: GSA Vulnerability Scanning Capabilities ..............................................................................8
Table 4-2: Scanning Schedule ........................................................................................................... 10
Table 5-1: Scanning Tool Applicability ............................................................................................... 15
Table 5-2: BigFix Reports .................................................................................................................. 16
Table 5-3: Configuration Setting Compliance Timeline....................................................................... 17
Table A-1: Risk Level Identification Table .......................................................................................... 18
Table B-1: Corrective Action Timelines .............................................................................................. 19
Table C-1: ISSO Vulnerability Management Tasks Table..................................................................... 21
Table D-1: Custom CSM Reporting Fields .......................................................................................... 22
Table E-1: Non-Compliant System ..................................................................................................... 23
Table E-2: Compliant System ............................................................................................................ 23
Notes:
Hyperlinks in running text will be provided if they link to a location within this document
(i.e., a different section or an appendix). Hyperlinks will be provided for external sources
unless the hyperlink is to a web page or document listed in Section 1.4. For example,
Google Forms, Google Docs, and websites will have links.
It may be necessary to copy and paste hyperlinks in this document (Right-Click, Select
Copy Hyperlink) directly into a web browser rather than using Ctrl-Click to access them
within the document.
1 Introduction
The General Services Administration (GSA) Chief Information Security Officer (CISO) is
responsible for implementing and administering an information security program to protect the
agency’s information resources, support business processes and the GSA mission. One part of
that program is the establishment of a vulnerability management process, this guide describes
that process. It addresses remediating vulnerabilities that are published as part of the
Department of Homeland Security (DHS) Cybersecurity Infrastructure Security Agency’s (CISA)
Cybersecurity Directives and establishes a process by which vulnerabilities affecting GSA
systems are identified using various security tools and communicated to appropriate personnel
for remediation.
1.1 Purpose
The purpose of this guide is to describe the procedures the GSA CISO has established to identify
and address vulnerabilities affecting GSA’s systems.
1.2 Scope
This guide must be followed by all GSA Federal employees and contractors managing (i.e.,
finding, reporting, tracking) vulnerabilities on GSA information systems and data. All GSA
systems, Contractor or Federal as defined below, must adhere to the timelines described in
Section 3 this guide.
1.3 Policy
GSA Order CIO 2100.1, “GSA Information Technology (IT) Security Policy” contains the following
policy statements regarding requirements related to vulnerability management.
a. GSA System Program Managers and Contracting Officers shall ensure that the
appropriate security requirements of this Order are included in task orders and contracts
for all IT systems designed, developed, implemented, and operated by a contractor on
behalf of GSA, including but not limited to systems operating in a Cloud Computing
environment. In addition, GSA shall ensure that the contract allows GSA or its designated
representative (i.e., third-party contractor) to review, monitor, test, and evaluate the
b. The security controls implemented as part of contracts and task orders must include
specific language that requires solutions to align with existing information security
architecture. Security deliverables must be provided in a timely manner for review and
acceptance by GSA. Additional information may be found in GSA CIO-IT Security-09-48,
Security and Privacy Requirements for IT Acquisition Efforts and, for external information
systems, in GSA CIO-IT Security-19-101, External Information System Monitoring. Note:
As indicated in Chapter 1, Section 5, GSA has a deviation request process by which a
deviation from approved security architecture/standards may be requested.
4. Risk Assessment.
4. Analysis.
f. The OCISO will establish a vulnerability management process for identifying
vulnerabilities via internal testing/scanning.
g. The OCISO will notify personnel with security responsibilities of vulnerabilities
disclosed via SAAs or other external sources.
4. Mitigation.
1.4 References
Note: GSA updates its IT security policies and procedural guides on independent cycles which
may introduce conflicting guidance until revised guides are developed. In addition, many of the
references listed are updated by external organizations which can lead to inconsistencies with
GSA policies and guides. When conflicts or inconsistencies are noticed, please contact
[email protected] for guidance.
GSA Guidance:
GSA Order CIO 2100.1, “GSA Information Technology (IT) Security Policy”
The guidance documents below are available on the GSA IT Security Procedural Guides
InSite page.
CIO-IT Security-06-30, “Managing Enterprise Cybersecurity Risk”
CIO-IT Security-09-44, “Plan of Action and Milestones (POA&M)”
CIO-IT Security-09-48, “Security and Privacy Requirements for IT Acquisition Efforts”
CIO-IT Security-19-101, “External Information System Monitoring”
2.5 Custodians
All GSA systems must implement NIST controls RA-5, Vulnerability Scanning and SI-2(3), Flaw
Remediation | Time to Remediate Flaws/Benchmarks for Corrective Actions in accordance with
the frequencies and timelines established in the control statements and parameters as
indicated below.
RA-5:
a. Monitor and scan for vulnerabilities in the system and hosted applications [weekly
authenticated scans for operating systems (OS)-including databases, monthly
unauthenticated scans for web application, annual authenticated scans for web
applications] and when new vulnerabilities potentially affecting the system are
identified and reported;
d. Remediate legitimate vulnerabilities [
(1) BOD Timelines
(a) Within 14 days for vulnerabilities added to CISA’s KEV Catalog with a CVE date
post FY21.
(b) Per the CISA KEV catalog date or GSA Standard timelines below, whichever is
earlier, for vulnerabilities in the CISA KEV catalog with a CVE date in FY21 or
earlier.
(c) Within 15 days for Critical (Very High) vulnerabilities for Internet-accessible
systems or services.
(2) GSA Standard Timelines
(a) Within 30 days for Critical (Very High) and High vulnerabilities.
(b) Within 90 days for Moderate vulnerabilities.
(c) Within 120 days for Low vulnerabilities for Internet-accessible
systems/services.] in accordance with an organizational assessment of risk;
SI-2(3):
(b) Establish the following benchmarks for taking corrective actions: [
(1) BOD Timelines
(a) Within 14 days for vulnerabilities added to CISA’s KEV Catalog with a CVE date
post FY21.
(b) Per the CISA KEV catalog date or GSA Standard timelines below, whichever is
earlier for vulnerabilities in the CISA KEV catalog with a CVE date in FY21 or
earlier.
(c) Within 15 days for Critical (Very High) vulnerabilities for Internet-accessible
systems or services].
(2) GSA Standard Timelines
(a) Within 30 days for Critical (Very High) and High vulnerabilities.
(b) Within 90 days for Moderate vulnerabilities.
(c) Within 120 days for Low vulnerabilities for Internet-accessible systems or
services.] in accordance with an organizational assessment of risk;
As indicated in the Section 2 every role listed has some responsibility to ensure the required
scanning activities can and are performed for all GSA systems, applications, and assets; and that
remediation actions are taken.
CIO 2100.1 establishes the controls/requirements for compliance to Federal Laws and
regulations, including DHS CISA Cybersecurity Directives and NIST publications. CIO-IT-Security-
06-30 reinforces these requirements and specifies requirements for vulnerability scanning and
flaw remediation. CIO-IT Security-09-48 reinforces the requirements to adhere to GSA policies
and requirements for all IT acquisitions (i.e., contracted systems), and CIO-IT Security-19-101
establishes the means by which GSA monitors external contractor systems for compliance with
GSA’s requirements.
In addition to the NIST requirements specified in the previous section, the processes defined in
GSA’s IT Security Policy and the procedural guides identified above, the primary adherence
requirements are generated by CISA’s Cybersecurity Directives which are explained in the
following sections.
Emergency Directive. Section 3553(h) of title 44 U.S. Code, authorizes the Secretary of
Homeland Security, in response to a known or reasonably suspected information security
threat, vulnerability, or incident that represents a substantial threat to the information
security of an agency, to “issue an emergency directive to the head of an agency to take any
lawful action with respect to the operation of the information system, including such
systems used or operated by another entity on behalf of an agency, that collects, processes,
stores, transmits, disseminates, or otherwise maintains agency information, for the purpose
of protecting the information system from, or mitigating, an information security threat.”
Although all CISA Cybersecurity Directives, both EDs and BODs, are applicable to GSA’s systems,
the following sections highlight specific directives that are focused on vulnerability
management, identification, and remediation.
All publicly accessible Federal websites and web services provide service through a
secure connection (HTTPS-only, with HSTS),
SSLv2 and SSLv3 are disabled on web servers, and
3DES and RC4 ciphers are disabled on web servers
overdue, in-scope vulnerabilities. If a remediation plan is received, SecOps will complete the
following fields in the remediation plan in cooperation with system personnel:
All internet-accessible systems within GSA are required to be onboarded to the GSA
vulnerability disclosure program and abide by the published policy.
3.2.5 BOD 22-01 - Reducing the Significant Risk of Known Exploited Vulnerabilities
This BOD creates the CISA KEV catalog and creates remediation timelines associated with all
CVEs included within the catalog. SecOps will provide alerts to ISSOs related to flagged CISA
KEVs within their environments. SecOps will additionally be responsible for reporting BOD 22-
01 vulnerability metrics to CISA until such time as it is automated within the CDM dashboard.
4 Vulnerability Management
The following sections provide details on GSA SecOps’ scanning capabilities, processes, reports,
verification, and exception handling.
This section describes key components of the vulnerability scanning process. See Appendix A
for how risk levels are assigned based on the vulnerability identification tools used at GSA.
Note: Failure to update system inventory data will result in inaccurate vulnerability scan reports
which, in turn, will lead to inaccurate System POA&M data and report.
the Scanning Team will update the scan tool configuration (i.e., add plugins to a scan profile,
etc.) to maximize the vulnerabilities tested by the tool.
Table 4-1 provides a high-level view of scanning frequency. Additional details are available within
the 06-30 Scanning Parameter Spreadsheet.
Due to the “in host” nature of the agent scans not all plugins run. To ensure that all applicable
vulnerability plugins within Tenable.sc are applied to GSA hosts during vulnerability scanning
additional scans are necessary. These supplemental active scans run against all GSA hosts that
contain a Nessus Agent and are conducted weekly on Thursdays.
To support security of Docker images and containers, GSA has deployed a Prisma Cloud
Compute Console to manage security and reporting requirements of vulnerability scanning. This
software gathers information from deployed agents called ‘Prisma Defenders’ which are
containers running on each server running the Docker engine. Prisma Defenders provide real-
time monitoring for all resources used by each running container on the system. This
information is sent to the Prisma Cloud Compute Defender Console where reporting and
enforcement takes place.
To support vulnerability scanning of Kubernetes environments GSA SecOps has deployed the
StackRox security suite that monitors Kubernetes environments on a daily basis.
Web application scans are conducted using the Netsparker web application testing suite.
SecOps maintains this tool and is responsible for scanning and reporting out of the tool. In
general Web application scans fall into two categories:
Unauthenticated Scans
Authenticated Scans
Out of cycle, or ad hoc, vulnerability scans will be performed on an as-requested basis, at the
discretion of the SecOps Scanning Team. Ad hoc scans are typically requested by ISSOs or
Application Developers in order to verify the remediation of a previously identified
vulnerability, support firewall change requests, or determine the security impact of any major
system changes. However, they may be requested by anyone with a vested interest in the
security posture of a system. Requests must be approved by the ISSM. Ad hoc vulnerability
scans may be requested via a ServiceNow Request using the following steps.
1. Open Service Now
2. Select “Submit Catalog Request”
3. Select “Data Enterprise Services”
4. Select “Security Scan Requests”
Note: Ad hoc scans may be performed with or without authentication depending upon the
configuration and the requirements of the request.
Note: All requested firewall changes will be supported by a vulnerability scan of the associated
host IPs and web applications.
The SecOps Scanning Team will produce and distribute vulnerability scan reports used to track
vulnerabilities on assets. These reports can support an ISSO’s workflow for tracking
vulnerabilities thru closure (i.e., remediation). They can contain all the required fields for
understanding the vulnerabilities found on an asset, and their severity. These vulnerability
reports are classified as Controlled Unclassified Information and distributed on a need-to-know
basis.
StackRox automated reporting is conducted on a daily basis. The distribution list for these
reports is maintained by the SecOps team.
In Tenable.sc, data related to the aging of vulnerabilities will be collected and tracked by the
SecOps Scanning Team and provided to Executives, ISSMs, and ISSOs during the normal
reporting cycles. Vulnerabilities will mature based on the date originally identified in scan
results/reports. Vulnerabilities over 30 days old will be depicted within each report. The
provided associated files will contain columns depicting when vulnerabilities were ‘first
discovered’ and ‘last observed.’ ISSMs and ISSOs should leverage the reports and associated
files to assist with prioritizing mitigation activities.
Prisma Cloud Compute does not track ‘first discovered’ or ‘last observed’ information on
vulnerabilities on a per image basis. Its reports contain links to each specific vulnerability which
can be followed to find the date on which the vulnerability was announced to the open
community. This date should be used to calculate the 30-day and 90-day countdown for
prioritizing mitigation and resolution.
Web Application scanning conducted within Netsparker has the ability to do targeted
remediation tests which can be used to mark a finding as remediated. Additionally,
vulnerabilities can be marked as closed manually when manual testing is completed to show
remediation.
Special considerations may be made for the reporting of vulnerabilities associated with
Acceptance of Risk (AoR) letters that have been approved per CIO-IT Security-06-30, “Managing
Enterprise Cybersecurity Risk.” ISSOs may request re-categorization of vulnerabilities included in
AoRs as follows:
Web Application vulnerabilities may be considered false positives, therefore excluding
them from vulnerability reports.
Operating system vulnerabilities will be ‘accepted’ within Tenable.sc when SecOps is
provided with a valid AOR
Operating system vulnerabilities may be recast to ‘informational’ with supporting
justification.
Prisma Cloud Compute related vulnerabilities may be handled as ‘ignored’ within the
PCC Console, allowing them to be untracked in future reports.
It is the responsibility of the individual ISSOs to track their associated AoRs and present the
SecOps Scanning Team with supporting documentation, as requested.
Note: Vulnerabilities with recast risk levels will appear in vulnerability scan reports with the
assigned Common Vulnerability Scoring System (CVSS) score, however the Severity level will be
shown as “Informational.”
Note: False Positives will be designated on an individual host-by-host basis. System wide
exceptions will only be made with explicit approval from the CISO/SecOps.
Several factors determine what tool will be used for CSM scanning: location, type of asset, level
of access to that asset. BigFix will be used whenever possible for CSM scanning. If a BigFix agent
cannot/should not be installed on the asset, Tenable Nessus will be used. Both solutions require
a configuration change on the asset and within the solution itself.
Table 5-1: Scanning Tool Applicability
Component Type Location CSM Tool Used
Workstation (GFE) Anywhere BigFix
Server On-premise BigFix
Server Cloud Tenable/BigFix
Network Devices On-premise Tenable
ISSOs, ISSMs, and other personnel responsible for the security of a system can use a variety of
different reports and dashboards within BigFix Compliance and Tenable Security Center to
monitor their compliance scores. See Appendices D and E for additional information regarding
CDM data for reporting and configuration settings.
Some configuration settings cannot be applied to an asset(s) for valid reasons. In these cases,
the ISSO should request a deviation for these settings; otherwise, compliance scores will be
calculated and reported incorrectly. Any deviations, exceptions, or other conditions not
following GSA policies and standards must be submitted using the Security Deviation Request
Google Form. Once the deviation is documented and approved, those settings can be excluded
from compliance score calculations.
BOD Timelines
Within 14 days Remediate vulnerabilities Any GSA system with the BOD 22-01
added to CISA’s Known newly identified
Exploited Vulnerabilities vulnerabilities.
(KEV) Catalog with a CVE date
post FY21.
CISA KEV catalog Remediate vulnerabilities in Any GSA system with the BOD 22-01
date or GSA the CISA KEV catalog with a vulnerabilities listed in the
Standard timelines CVE date in FY21 or earlier. CISA KEV catalog.
below, whichever is
earliest.
Within 15 days of Remediate Critical (Very High) Any GSA system identified in BOD 19-02/
initial detection vulnerabilities for systems or a DHS Cyber Hygiene Report BOD 20-01
services with Internet-accessible with critical vulnerabilities.
IP addresses.
Within 30 days of Remediate High vulnerabilities Any GSA system identified in BOD 19-02/
initial detection for systems or services with a DHS Cyber Hygiene Report BOD 20-01
Internet-accessible IP addresses. with high vulnerabilities.
Standard GSA
Timelines
Within 30 days of Remediate Critical (Very High) Any GSA system identified RA-5 control
initial detection and High vulnerabilities. with critical (very high) parameter
vulnerabilities.
Within 90 days of Remediate Moderate Any GSA system identified RA-5 control
initial detection vulnerabilities. with moderate parameter
vulnerabilities.
Within 120 days of Remediate Low vulnerabilities Any GSA Internet-accessible RA-5 control
initial detection for Internet-accessible systems Web application identified parameter
or services. with low vulnerabilities.
No specific deadline Remediate Low/Very Low Any GSA system identified 06-30,
unless defined by the vulnerabilities on a case-by-case with low/very low Section 5.7.3
GSA OCISO basis. vulnerabilities.