Vulnerability Response remediation overview
-
- UpdatedJan 30, 2025
- 2 minutes to read
- Yokohama
- Vulnerability Response
Vulnerability Response remediation is a phased process consisting of verifying import completion, triaging new vulnerabilities, and monitoring progress to completion. Approached in this way, remediation becomes manageable, timely, and in many ways, automated.
Understanding your security posture across company assets helps you identify the most critical vulnerabilities for remediation. This remediation process requires that Vulnerability Response and a third-party integration such as the Qualys Vulnerability Integration are installed and configured.

Verify the successful completion of third-party integration imports
The first phase in this process is to ensure that everything is working correctly. Vulnerability Response is preset to download National Vulnerability Database (NVD) and Common Enumeration Weakness (CWE) vulnerabilities. Third-party imports provide you with the data you need to create vulnerable items and remediation tasks. Successful remediation depends on the consistent and successful import of vulnerabilities and vulnerable items.
During import CI Lookup Rules match third-party assets to assets in the Configuration Management Database (CMDB). All assets are stored in the Discovered Items module. CI information is critical to solution implementation.
Integration status run reports for the supported third-party integrations are shipped with the applications to give you a graphical overview of your imports. Use this report, or create your own, to easily determine whether your latest import has succeeded. For more information about supported integrations, see Vulnerability Response integrations.
Review and triage vulnerabilities and vulnerable items
The next phase of remediation calls for the review of new vulnerabilities and vulnerable items. A vulnerable item (VI) is a detected combination of vulnerability and configuration item (CI). As vulnerable items are formed, various rules are run that assign VIs, determine the risk they pose and set remediation targets. Adjust any rules, as necessary, to ensure that the vulnerable items have been triaged successfully.
Monitor the progress of existing vulnerability remediation
- Review the status of imports for patch implementations that have not shown up and follow up with IT Operations.
- Track the progress of regulatory compliance obligations and ensure their completion.
- Review deferred item status and revise or implement fixes.
- Monitor Vulnerability Management dashboards. To review trends, view reports in real-time, and use metrics that track your remediation target attainment rates, you may prefer to monitor your processes with the Performance Analytics for Vulnerability Response application.
- Closing stale detections in Vulnerability Response.