PROCEDURE Vulnerability-Management-Procedure Template en
PROCEDURE Vulnerability-Management-Procedure Template en
PROCEDURE Vulnerability-Management-Procedure Template en
Vulnerability Assessment
Procedure Template
Disclaimer
This template has been developed by the National Cybersecurity
Authority (NCA) as an illustrative example that can be used by organizations
as a reference and guide. This template must be customized and aligned with
the <organization name>’s business and relevant legislative and regulatory
requirements. This template must be approved by the head of the organization
(Authorizing official) or his/her delegate. The NCA is not responsible for any
use of this template as is, and it affirms that this template is solely an
illustrative example.
Choose Classification
VERSION <1.0>
1
Vulnerability Assessment
Procedure Template
Document Approval
Version Control
Version Date Updated by Version Details
<Insert version Click here to <Insert individual’s full <Insert description of the
number> add date personnel name> version>
Review Table
Periodical Review Rate Last Review Date Upcoming Review Date
<Once a year> Click here to add date Click here to add date
Choose Classification
VERSION <1.0>
2
Vulnerability Assessment
Procedure Template
Table of Contents
Purpose.............................................................................................................4
Scope................................................................................................................4
Overview of the Vulnerability Management Process.........................................4
Phase 1. Prepare Vulnerability Assessment..................................................8
Phase 2. Perform Vulnerability Assessment..................................................8
Phase 3. Remediate the Vulnerabilities.......................................................13
Phase 4. Intelligence Threat feeds...............................................................18
Roles and Responsibilities..............................................................................26
Update and Review.........................................................................................26
Compliance......................................................................................................26
Choose Classification
VERSION <1.0>
3
Vulnerability Assessment
Procedure Template
Purpose
This procedure aims to define detailed step-by-step cybersecurity
requirements to asses vulnerabilities and protect <organization name>’s
information technology assets against threats and cybersecurity
vulnerabilities.
The requirements in this procedure are aligned with the cybersecurity
requirements issued by the National Cybersecurity Authority (NCA), including
but not limited to (ECC-1:2018), (DCC-1:2022), (CSCC-1:2019) and (CCC-
1:2020), in addition to other related cybersecurity legal and regulatory
requirements.
Scope
This procedure covers all <organization name>’s information technology
assets and applies to all personnel (employees and contractors) in
<organization name>.
Choose Classification
VERSION <1.0>
4
Vulnerability Assessment
Procedure Template
Choose Classification
VERSION <1.0>
0
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
1-1 Promote Promote a dedicated Process Owner <cybersecurity Criteria for Dedicated <cybersecurity
Process who will be responsible for the function> the process process owner function>
Owner implementation and the management owner has been
of the <organization name>’s selection nominated
Vulnerability Management Program.
1-2 Identify Identify all assets which are in scope of <cybersecurity Information Identified <cybersecurity
Assets vulnerability management. The function> and assets in function>
authorized hardware and software are technology scope of
<Information
documented in the <organization asset register vulnerability
Technology
name>'s Asset Management Policy management
function>
and Standard.
1-3 Identify Verify the business criticality of all <cybersecurity Identified Verified <all
Business assets which are in scope of function> assets in business departments of
Criticality of vulnerability management. scope of criticality of organization>
Assets vulnerability assets
Choose Classification
VERSION <1.0>
1
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
management
1-4 Identify Asset Identify business and system owners <cybersecurity Verified Identified <cybersecurity
Owners of assets who are responsible for function> business business and function>
remediating identified vulnerabilities criticality of system owners
based on agreed KPIs as described in assets of assets
the <organization name>’s Key
Performance Indicators for
Vulnerability Management.
1-5 Identify Document the identified stakeholders <cybersecurity Identified Documented <cybersecurity
Stakeholders in the <organization name>’s function> business and stakeholders function>
Vulnerability Management Process. system
owners of
assets
1-6 Implement Implement vulnerability scanning tool <cybersecurity Low level Implemented <cybersecurity
the Scanning suitable for the <organization name>’s design of the vulnerability
Choose Classification
VERSION <1.0>
2
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
1-7 Select Selecting suitable scanning <cybersecurity Low level Selected <cybersecurity
Methodology methodology, by performing function> design of the scanning function>
authenticated scan either using solution methodology
<Information
credential based or agent-based for identified
Technology
scanning methodology (in case the critical assets
function>
uncredentialed scan is not suitable and
credentialed scan cannot be used due
to technical or other limitations), for the
identified Critical Assets
1-8 Prepare Create the accounts used for <Information Selected List of critical <cybersecurity
credentialed Credentialed Scan, following the Technology scanning assets function>
Choose Classification
VERSION <1.0>
3
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
1-9 Perform Perform test credentialed scan (also <Information Account List of required <cybersecurity
credentialed known as an authenticated scan) to Technology created for patches and function>
scan provide a definitive list of required function> credential misconfiguratio
<Information
patches and misconfigurations by scan for n
Technology
using credentials to log into systems identified
function>
and applications. critical assets
1-10 Prepare Implement local scan agent <Information Selected List of critical <cybersecurity
agent based (lightweight, low-footprint programs) on Technology scanning assets, with function>
scan the host. function> methodology implemented
<Information
for identified local scan
Technology
critical assets agent
function>
Choose Classification
VERSION <1.0>
4
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
1-11 Perform Perform agent based test scan in order <Information Implemented List of required <cybersecurity
agent based to collect vulnerability, compliance, Technology local scan patches and function>
scan and system data, and report that function> agent misconfiguratio
<Information
information back to the central scan n
Technology
server for analysis.
function>
1-12 New Asset Ensure the onboarding of new assets <cybersecurity Updated New assets <Information
Onboarding in the vulnerability management function> asset register onboarded Technology
program in a timely manner, by the function>
necessary processes.
1-13 Define Time Verify that the vulnerability scan does <Information Selected Verification of <cybersecurity
Window not interfere with any other scheduled Technology scanning scan function>
activities, i.e., Backup, Scheduled function> methodology interference
Maintenance, etc. for identified with other <Information
critical assets activities Technology
function>
Choose Classification
VERSION <1.0>
5
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
1-14 Define Scan Define the frequency of the <cybersecurity Selected Defined <cybersecurity
Frequency vulnerability scan as described in the function> scanning vulnerability function>
<organization name> Vulnerability methodology scan frequency
Management Policy and Standard. for identified
critical assets
1-15 Create Creating a central location to store the <Information Selected Central <cybersecurity
Report vulnerability scan reports and the Technology scanning location to function>
Repository <organization name>’s Vulnerability function> methodology store reports
<Information
Register. for identified
Technology
critical assets
function>
1-16 Grant Access Ensure that only employee with valid <cybersecurity List of Role based <cybersecurity
to Repository need to know are granted access to function> employees access model function>
this central location as listed in the with access to dedicated for
<Information
<organization name>’s Vulnerability central the central
Technology
Management Policy. location repository
Choose Classification
VERSION <1.0>
6
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
function>
Choose Classification
VERSION <1.0>
7
Vulnerability Assessment
Procedure Template
Choose Classification
VERSION <1.0>
8
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
2-1 Perform Scan Execute the vulnerability scan as it <Information Approved Vulnerability <cybersecurity
was documented in the approved Technology change scan report function>
change record. function> record
<Information
Technology
function>
2-2 Monitor Monitor the performance of both of the <Information Identified Assets <cybersecurity
Performance vulnerability scan environment as well Technology critical assets negatively function>
as the assets being scanned, for the function> in scope for impacted by
<Information
duration of the scan. vulnerability the scan
Technology
scan
function>
2-3 Communication Communicate any issue with the <cybersecurity Assets Issue <all
During Scan appropriate stakeholders as described function> negatively communicated departments of
in the change record. impacted by to stakeholders organization>
the scan
Choose Classification
VERSION <1.0>
9
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
2-4 Verify Scan Verify that all assets in scope of <cybersecurity Vulnerability List of assets <cybersecurity
Coverage vulnerability management were function> scan report missed by the function>
scanned successfully vulnerability
<Information
Asset register scan
Technology
function>
2-5 Investigate Investigate any deviation in a timely <cybersecurity List of assets Investigated <cybersecurity
Deviations manner based on agreed KPIs. function> missed by the deviation function>
vulnerability
scan
2-6 Repeat Scan Repeat the vulnerability on the assets, <cybersecurity List of assets Repeated scan <cybersecurity
where the scan failed during the function> missed by the function>
previous attempt. vulnerability
scan <Information
Technology
function>
Choose Classification
VERSION <1.0>
10
Vulnerability Assessment
Procedure Template
Owner/
No. Step Description Inputs Outputs Stakeholders
Responsible
2-7 Communicate Communicate the end-result of the <cybersecurity Vulnerability Scan result <cybersecurity
Scan Results scan to the relevant stakeholders function> scan report made available function>
at central
repository
2-8 Communicate Notify the CSTs (Cloud Service Team) <cybersecurity Scan result Cloud <cybersecurity
cloud of identified vulnerabilities that may be function> made vulnerabilities function>
vulnerabilities affecting them and put safeguards in available at communicated
place. central
repository
2-9 Monitor Measure key performance indicators <cybersecurity Vulnerability KPI report <cybersecurity
Process (KPI) to ensure the continuous function> scan report function>
Performance improvement of vulnerability
management.
Choose Classification
VERSION <1.0>
11
Vulnerability Assessment
Procedure Template
Choose Classification
VERSION <1.0>
12
Vulnerability Assessment
Procedure Template
Owner/
No. Task Description Inputs Outputs Stakeholders
Responsible
3-1 Validate Validate the result of the vulnerability <cybersecurity Vulnerability Validated end <cybersecurity
Scan scan. function> scan report results function>
Results
3-2 Update Add false alerts to the exception list. <cybersecurity Validated end False alerts <cybersecurity
Exception function> results added to function>
List exception list
<Information
Technology
function>
3-3 Perform Risk Analyze vulnerabilities and their <cybersecurity Validated end Analyzed <cybersecurity
Assessment associated risks based on the function> results vulnerabilities function>
<organization name>’s Risk and risks
Management Policy.
3-4 Update Document all identified vulnerabilities <cybersecurity Analyzed Updated <cybersecurity
Vulnerability in the <organization name>’s vulnerabilities vulnerability
Choose Classification
VERSION <1.0>
13
Vulnerability Assessment
Procedure Template
Owner/
No. Task Description Inputs Outputs Stakeholders
Responsible
3-5 Remediation Defined corrective actions for each <cybersecurity Updated Defined action <cybersecurity
Planning identified vulnerability based on their function> vulnerability plan to assess function>
risk level. register vulnerability
3-6 Update Add vulnerabilities with tolerable risk <cybersecurity Updated Updated <cybersecurity
Exception level to the exception list. function> vulnerability exception list function>
List register
3-8 Remediation Remediate the newly discovered <Information Defined Implemented <cybersecurity
Choose Classification
VERSION <1.0>
14
Vulnerability Assessment
Procedure Template
Owner/
No. Task Description Inputs Outputs Stakeholders
Responsible
3-9 Validate Verify the success of the <cybersecurity Implemented Verification of <cybersecurity
Remediation implementation of the corrective function> corrective implementation function>
actions by rerunning the vulnerability actions
scan on the relevant assets. <Information
Technology
function>
3-10 Notify CSP Notify the management of CSP <cybersecurity Verification of Result of <cybersecurity
(Content Security Policy), that the function> implementatio implementation function>
safeguards in relation to cloud-based n communicated
vulnerabilities are in place.
Choose Classification
VERSION <1.0>
15
Vulnerability Assessment
Procedure Template
Owner/
No. Task Description Inputs Outputs Stakeholders
Responsible
3-11 KPI Measure key performance indicators <cybersecurity Verification of KPI report <cybersecurity
reporting (KPI) described in the Key function> implementatio function>
Performance Indicators section of the n
document to ensure the continuous
improvement of vulnerability
management.
3-12 Reporting Provide regular reporting for the <cybersecurity KPI report Regular <cybersecurity
<organization name>’s senior function> reporting to function>
management about the vulnerabilities senior
and subsequent risks as described in management
the <organization name>’s Risk
Management Policy.
Choose Classification
VERSION <1.0>
16
Vulnerability Assessment
Procedure Template
Choose Classification
VERSION <1.0>
17
Vulnerability Assessment
Procedure Template
Owner/
No. Task Description Inputs Outputs Stakeholders
Responsible
4-1 Check Daily review of potential technical <cybersecurity Information Validated end <cybersecurity
Threat vulnerabilities coming from trusted function> from trusted results function>
Feeds authorized sources. sources
4-2 Perform Analyze vulnerabilities and their <cybersecurity Validated end Analyzed <cybersecurity
Risk associated risks based on the function> results vulnerabilities function>
Assessment <organization name>’s Risk and risks
Management Policy.
4-3 Update Document all identified vulnerabilities <cybersecurity Analyzed Updated <cybersecurity
Vulnerability in the <organization name>’s function> vulnerabilities vulnerability function>
Register Vulnerability Register. and risks register
4-4 Remediation Define corrective actions for each <cybersecurity Updated Defined <cybersecurity
Planning identified vulnerability based on their function> vulnerability action plan to function>
risk level. register assess
vulnerability
Choose Classification
VERSION <1.0>
18
Vulnerability Assessment
Procedure Template
Owner/
No. Task Description Inputs Outputs Stakeholders
Responsible
4-5 Remediation Implement the corrective actions <Information Defined Implemented <Information
based on the <organization name>’s Technology action plan to corrective Technology
Patch Management Policy and function> assess actions function>
Standard. vulnerability
Choose Classification
VERSION <1.0>
19
Roles and Responsibilities
1- Procedure Owner: <head of the cybersecurity function>
2- Procedure Review and Update: <cybersecurity function>
3- Procedure Implementation and Execution: <information technology
function>
4- Procedure Compliance Measurement: <cybersecurity function>
Compliance
1- The <head of the cybersecurity function> will ensure compliance of
<organization name> with this procedure on a regular basis.
2- All personnel (employees and contractors) at <organization name>
must comply with this procedure.
3- Any violation of this procedure may be subject to disciplinary action
according to <organization name>’s procedures.