Vulnerability Response and Remediation
Addressing vulnerabilities through patching, segmentation, compensating controls, and exception handling. Includes validation of fixes and remediation verification processes.
Understanding Vulnerability Response and Remediation
Vulnerability response translates analysis into action. Options include patching (preferred), compensating controls, segmentation, or documented acceptance—each with different trade-offs.
Remediation options: • Patching — Apply vendor fixes • Compensating controls — Alternative mitigations • Segmentation — Limit exposure • Exceptions — Document and accept risk • Validation — Verify fixes work
The WannaCry ransomware (2017) exploited a Windows SMB vulnerability that Microsoft had patched two months earlier. Organizations that delayed patching suffered massive damage. The UK's NHS was particularly affected—delayed remediation cost an estimated £92 million.
Finding vulnerabilities without fixing them provides no security benefit.
Why This Matters for the Exam
Vulnerability remediation is heavily tested on SY0-701 because fixing vulnerabilities is the goal. Questions cover remediation options, validation, and exception handling.
Understanding remediation helps with patch management, risk acceptance, and security operations. Identification without remediation leaves vulnerabilities exploitable.
The exam tests recognition of remediation strategies and appropriate selection.
Deep Dive
What Is Patching?
Patching applies vendor-supplied fixes to eliminate vulnerabilities.
Patch Types:
| Type | Description | Urgency |
|---|---|---|
| Security patch | Fixes vulnerability | High |
| Hotfix | Emergency fix | Immediate |
| Service pack | Cumulative updates | Scheduled |
| Feature update | New functionality | Planned |
Patch Management Process:
1. Identify available patches 2. Assess applicability 3. Test in lab environment 4. Schedule deployment 5. Deploy to production 6. Verify installation 7. Document completion
Patch Prioritization:
Critical/Emergency: - CISA KEV vulnerabilities - Active exploitation - Internet-facing systems Timeline: 24-72 hours High: - CVSS 7.0+ - Public exploit available Timeline: 1-2 weeks Medium/Low: - CVSS < 7.0 - No exploit Timeline: Next maintenance window
What Are Compensating Controls?
When patching isn't possible, compensating controls provide alternative protection.
When to Use Compensating Controls:
| Scenario | Example |
|---|---|
| No patch available | Zero-day, vendor delay |
| Patch breaks function | Application compatibility |
| Legacy system | No longer supported |
| Operational constraint | Can't take offline |
Compensating Control Examples:
Network-level: - Firewall rules blocking attack vectors - IPS signatures detecting exploit - Network segmentation Host-level: - Application whitelisting - Enhanced monitoring - Access restrictions Application-level: - WAF rules - Input validation - Configuration changes
Compensating Control Requirements:
Must: - Address the same risk - Be independently verified - Be documented - Be monitored - Have expiration/review date
What Is Segmentation for Remediation?
Segmentation isolates vulnerable systems to limit exposure.
Segmentation Strategies:
Network segmentation: - Move to isolated VLAN - Block unnecessary traffic - Monitor all access Micro-segmentation: - Per-application isolation - Zero trust approach - Tight access controls
Segmentation as Remediation:
Before segmentation:
[Internet] → [Network] → [Vulnerable System]
↓
[All Internal Systems]
After segmentation:
[Internet] → [Network] → [Firewall] → [Vulnerable System]
(Isolated)
↓
[Minimal Required Access Only]
Reduced attack surface
Limited blast radius
Monitored connectionsWhat Is Exception/Acceptance?
Sometimes vulnerabilities must be accepted with documentation.
Exception Process:
1. Document vulnerability 2. Explain why remediation isn't possible 3. Identify compensating controls 4. Assess residual risk 5. Get management approval 6. Set review date 7. Monitor continuously
Exception Documentation:
| Element | Content |
|---|---|
| Vulnerability | CVE, description |
| Affected system | Asset details |
| Business justification | Why can't patch |
| Compensating controls | Mitigations in place |
| Residual risk | Remaining exposure |
| Approver | Risk owner signature |
| Review date | When to reassess |
How Do You Validate Remediation?
Validation confirms vulnerabilities are actually fixed.
Validation Methods:
| Method | Description |
|---|---|
| Rescan | Run vulnerability scan again |
| Patch verification | Confirm patch installed |
| Manual test | Attempt to exploit |
| Configuration check | Verify settings changed |
Validation Process:
After patching: 1. Verify patch installed (version check) 2. Rescan with vulnerability scanner 3. Confirm vulnerability no longer detected 4. Test system functionality 5. Document validation results If still vulnerable: 1. Investigate failure 2. Check patch application 3. Verify correct patch 4. Reapply if necessary
What If Remediation Fails?
Remediation Failure Handling:
Common failures: - Patch didn't apply - Wrong patch version - Compensating control inadequate - System reverted Response: 1. Identify root cause 2. Determine alternative approach 3. Escalate if needed 4. Re-attempt remediation 5. Validate again
How CompTIA Tests This
Example Analysis
Scenario: A critical vulnerability (CVE-2023-XXXX, CVSS 9.8) is discovered on a production database server. The vendor patch requires a reboot, but the system has a 99.99% availability SLA. Develop a remediation approach.
Analysis - Constrained Remediation:
Situation:
Vulnerability: CVE-2023-XXXX (CVSS 9.8) System: Production database Constraint: 99.99% SLA (52 min downtime/year max) Patch requirement: System reboot Current downtime used: 40 minutes YTD Available: 12 minutes
Option Analysis:
Option 1: Immediate Patching
Pros: - Eliminates vulnerability - Best security outcome Cons: - Likely exceeds SLA (reboot > 12 min) - SLA violation penalties - Business impact Decision: Need alternative approach first
Option 2: Compensating Controls + Scheduled Patch
Phase 1 - Immediate compensating controls: ✓ Network segmentation (isolate database) ✓ Firewall rules (block attack vectors) ✓ IPS signature (detect exploit attempts) ✓ Enhanced monitoring (alert on anomalies) Phase 2 - Scheduled maintenance: ✓ Coordinate with SLA exception process ✓ Schedule during planned maintenance window ✓ Apply patch during approved downtime ✓ Validate after patching
Compensating Control Implementation:
Network controls: 1. Move database to isolated VLAN 2. Update firewall rules: - Block port used by exploit - Allow only application servers 3. Deploy IPS signature for CVE-2023-XXXX Monitoring: 1. Alert on connection attempts to vulnerable port 2. Log all database access 3. Enable database audit logging Access controls: 1. Review and restrict database access 2. Require MFA for admin access 3. Remove unnecessary accounts
Exception Documentation:
CVE: CVE-2023-XXXX System: PROD-DB-01 Risk: Critical (9.8) Status: Compensating controls active Justification: - SLA constraint prevents immediate patching - Compensating controls reduce risk - Patch scheduled for maintenance window Controls: - Network isolation: VLAN 999 - Firewall rule: FW-2023-1234 - IPS signature: SIG-CVE-2023-XXXX - Enhanced monitoring: SIEM alert 5678 Residual risk: Medium (exploitability reduced) Approver: [CISO signature] Patch date: [Next maintenance window] Review: Weekly until patched
Validation Plan:
After patch applied: 1. Verify patch version installed 2. Run vulnerability scan 3. Confirm CVE-2023-XXXX resolved 4. Test database functionality 5. Remove compensating controls 6. Document completion
Key insight: When immediate patching isn't possible, compensating controls reduce risk while maintaining availability. However, compensating controls are temporary—schedule patching at earliest opportunity. Document everything for audit trail.
Key Terms
Common Mistakes
Exam Tips
Memory Trick
- •Remediation Options - "PCSE":
- •Patching (fix the vulnerability)
- •Compensating controls (alternative protection)
- •Segmentation (limit exposure)
- •Exception (document and accept)
- •Compensating Control Requirements - "DIVE":
- •Documented
- •Independently verified
- •Validated effectiveness
- •Expiration date set
- •Patch Management Process - "IATSRVD":
- •Identify patches available
- •Assess applicability
- •Test in lab
- •Schedule deployment
- •Roll out to production
- •Verify installation
- •Document completion
Validation Rule: "Patched without Verification = Hope, not security" Always rescan after remediation
- •Exception Documentation - "VJCAR":
- •Vulnerability details
- •Justification for exception
- •Compensating controls
- •Approver signature
- •Review date
Test Your Knowledge
Q1.A legacy system cannot be patched due to vendor end-of-life. What is the BEST approach?
Q2.After applying a security patch, what should be done to confirm remediation?
Q3.A critical patch requires system downtime that would violate SLA. What is the FIRST action?
Want more practice with instant AI feedback?
Continue Learning
Ready for the Exam?
See exactly where you stand on this concept and 182 others.
99% pass rate · Pass guarantee