Vulnerability Management Policy
Vulnerability Management Policy
General Description
Purpose:
The purpose of this document is to set out the policy and controls to implement and
maintain a sound vulnerability management program that covers the assessment and
management of technical vulnerabilities within the IT environment, with the objective of
proactively mitigating security risks associated with it.
This policy provides a consistent outline throughout the organization of the technology and
procedures necessary for implementing a comprehensive, and integrated vulnerability
management program to discover, assess, prioritize and remediate technical vulnerabilities
affecting Trinity University systems, including but not limited to operating systems,
applications, databases, web technologies, cloud resources, desktop software, mobile
devices, network devices and hardware, to maintain appropriate levels of security.
This policy is complemented with the Trinity University Vulnerability and Patch
Management Plan, which contains detailed implementation procedures of policy and
controls stated in the current document.
Scope:
This vulnerability management policy applies to all systems, people and processes that
constitute Trinity University’s (TU) information systems, including staff, executives, faculty,
and third parties with access to TU’s information technology assets and called hereinafter
as TU Workforce.
This vulnerability management policy applies to all systems, people and processes that
constitute Trinity University’s (TU) information systems, including staff, executives, faculty,
and third parties with access to TU’s information technology assets and called hereinafter
as TU Workforce.
Exceptions:
In a few instances, Trinity systems may require to be exempted from the vulnerability
management program due to possible technical difficulties or third-party contractual
obligations. Any such exceptions to the current policy must be documented and approved
via Trinity’s Exceptions Management Process.
Policy Content
This plan must detail Trinity's vulnerability and patch management program,
including the implementation of mechanisms to timely obtain information about
technical vulnerabilities of information systems, the evaluation of the organization’s
exposure to such vulnerabilities and the implementation of appropriate safeguards
to address the associated risk.
The plan must include supporting activities such as training and reporting metrics
for effective implementation of the vulnerability and patch management program.
The plan must include roles and responsibilities of teams/roles for accomplishing
all the activities of the vulnerability management program in a timely and effective
manner.
ITS must utilize authorized resources such as system vendor websites, third-party
mailing lists and newsgroups, vulnerability management databases, and different
tools for tracking the latest vulnerabilities.
ITS must prioritize the order and scheduling in which the organization addresses
vulnerability remediation.
The scheduling of the installation of updates will depend upon several factors including:
The expected time taken to install the updates (and requirements for service
outages to users).
The degree of risk associated with any vulnerabilities that are being mitigated by
the updates:
ITS must prioritize treatment of vulnerabilities based on their risk rating. Vulnerabilities
with rating critical or high must be treated foremost. If patching is required for the
vulnerability remediation, Trinity must comply with below minimum service levels.
Vulnerability Risk Rating Service Levels
Critical Less than 3 days
An updated release plan must be created and maintained to keep track of when various
systems will be updated, taking into account the factors listed above. The plan must be
managed through the change management process.
ITS must ensure third parties comply with the requirements of our vulnerability
management policy. Whenever possible, vulnerability management responsibilities are
included in contracts with third parties.
On a monthly basis, these security metrics must be presented to the Information Security
Governance Committee.
Performance Evaluation
Consequences of Policy Violation:
Users who violate this policy may be subject to disciplinary action, up to and including
termination of employment or contract with Trinity University.
Trinity University cooperates with appropriate law enforcement entities if any user may
have violated federal or state law. Instances of failure to adhere to this policy will be
brought to the attention of the Chief Information Officer (CIO). The CIO may seek
consultation/advice from Human Resources.
Term: Definition:
causing harm to a system.
Vulnerability A vulnerability is commonly defined as “an inherent weakness in an
information system, security procedures, internal controls, or implementation
that could be exploited by a threat source.”
Related Documents
Related Content:
Trinity’s vulnerability management policy is aligned with NIST Special Publication 800-40,
creating a patch and vulnerability management program.
1. NIST Special Publication 800-40 Version 2.0, Creating a Patch and Vulnerability
Management Program: https://csrc.nist.gov/publications/detail/sp/800-40/version-
20/archive/2005-11-16.
2. Vulnerability and Patch Management Plan: Link to Vulnerability and Patch
Management Plan.
Revision Management
Revision History Log:
Revision #: Date: Recorded By:
v2.0 4/27/2022 11:29 AM Ben Lim
v3 1/27/2022 1:18 PM Dan Carson
v2.0 8/21/2020 8:02 AM Holly Warfel
v1.0 1/14/2020 2:46 PM Courtney Cunningham