Objective 4.3High12 min

Vulnerability Response and Remediation

Addressing vulnerabilities through patching, segmentation, compensating controls, and exception handling. Includes validation of fixes and remediation verification processes.

Understanding Vulnerability Response and Remediation

Vulnerability response translates analysis into action. Options include patching (preferred), compensating controls, segmentation, or documented acceptance—each with different trade-offs.

Remediation options:Patching — Apply vendor fixes • Compensating controls — Alternative mitigations • Segmentation — Limit exposure • Exceptions — Document and accept risk • Validation — Verify fixes work

The WannaCry ransomware (2017) exploited a Windows SMB vulnerability that Microsoft had patched two months earlier. Organizations that delayed patching suffered massive damage. The UK's NHS was particularly affected—delayed remediation cost an estimated £92 million.

Finding vulnerabilities without fixing them provides no security benefit.

Why This Matters for the Exam

Vulnerability remediation is heavily tested on SY0-701 because fixing vulnerabilities is the goal. Questions cover remediation options, validation, and exception handling.

Understanding remediation helps with patch management, risk acceptance, and security operations. Identification without remediation leaves vulnerabilities exploitable.

The exam tests recognition of remediation strategies and appropriate selection.

Deep Dive

What Is Patching?

Patching applies vendor-supplied fixes to eliminate vulnerabilities.

Patch Types:

TypeDescriptionUrgency
Security patchFixes vulnerabilityHigh
HotfixEmergency fixImmediate
Service packCumulative updatesScheduled
Feature updateNew functionalityPlanned

Patch Management Process:

1. Identify available patches
2. Assess applicability
3. Test in lab environment
4. Schedule deployment
5. Deploy to production
6. Verify installation
7. Document completion

Patch Prioritization:

Critical/Emergency:
- CISA KEV vulnerabilities
- Active exploitation
- Internet-facing systems
Timeline: 24-72 hours

High:
- CVSS 7.0+
- Public exploit available
Timeline: 1-2 weeks

Medium/Low:
- CVSS < 7.0
- No exploit
Timeline: Next maintenance window

What Are Compensating Controls?

When patching isn't possible, compensating controls provide alternative protection.

When to Use Compensating Controls:

ScenarioExample
No patch availableZero-day, vendor delay
Patch breaks functionApplication compatibility
Legacy systemNo longer supported
Operational constraintCan't take offline

Compensating Control Examples:

Network-level:
- Firewall rules blocking attack vectors
- IPS signatures detecting exploit
- Network segmentation

Host-level:
- Application whitelisting
- Enhanced monitoring
- Access restrictions

Application-level:
- WAF rules
- Input validation
- Configuration changes

Compensating Control Requirements:

Must:
- Address the same risk
- Be independently verified
- Be documented
- Be monitored
- Have expiration/review date

What Is Segmentation for Remediation?

Segmentation isolates vulnerable systems to limit exposure.

Segmentation Strategies:

Network segmentation:
- Move to isolated VLAN
- Block unnecessary traffic
- Monitor all access

Micro-segmentation:
- Per-application isolation
- Zero trust approach
- Tight access controls

Segmentation as Remediation:

Before segmentation:
[Internet] → [Network] → [Vulnerable System]
                               ↓
                         [All Internal Systems]

After segmentation:
[Internet] → [Network] → [Firewall] → [Vulnerable System]
                                           (Isolated)
                              ↓
                     [Minimal Required Access Only]

Reduced attack surface
Limited blast radius
Monitored connections

What Is Exception/Acceptance?

Sometimes vulnerabilities must be accepted with documentation.

Exception Process:

1. Document vulnerability
2. Explain why remediation isn't possible
3. Identify compensating controls
4. Assess residual risk
5. Get management approval
6. Set review date
7. Monitor continuously

Exception Documentation:

ElementContent
VulnerabilityCVE, description
Affected systemAsset details
Business justificationWhy can't patch
Compensating controlsMitigations in place
Residual riskRemaining exposure
ApproverRisk owner signature
Review dateWhen to reassess

How Do You Validate Remediation?

Validation confirms vulnerabilities are actually fixed.

Validation Methods:

MethodDescription
RescanRun vulnerability scan again
Patch verificationConfirm patch installed
Manual testAttempt to exploit
Configuration checkVerify settings changed

Validation Process:

After patching:
1. Verify patch installed (version check)
2. Rescan with vulnerability scanner
3. Confirm vulnerability no longer detected
4. Test system functionality
5. Document validation results

If still vulnerable:
1. Investigate failure
2. Check patch application
3. Verify correct patch
4. Reapply if necessary

What If Remediation Fails?

Remediation Failure Handling:

Common failures:
- Patch didn't apply
- Wrong patch version
- Compensating control inadequate
- System reverted

Response:
1. Identify root cause
2. Determine alternative approach
3. Escalate if needed
4. Re-attempt remediation
5. Validate again

How CompTIA Tests This

Example Analysis

Scenario: A critical vulnerability (CVE-2023-XXXX, CVSS 9.8) is discovered on a production database server. The vendor patch requires a reboot, but the system has a 99.99% availability SLA. Develop a remediation approach.

Analysis - Constrained Remediation:

Situation:

Vulnerability: CVE-2023-XXXX (CVSS 9.8)
System: Production database
Constraint: 99.99% SLA (52 min downtime/year max)
Patch requirement: System reboot
Current downtime used: 40 minutes YTD
Available: 12 minutes

Option Analysis:

Option 1: Immediate Patching

Pros:
- Eliminates vulnerability
- Best security outcome

Cons:
- Likely exceeds SLA (reboot > 12 min)
- SLA violation penalties
- Business impact

Decision: Need alternative approach first

Option 2: Compensating Controls + Scheduled Patch

Phase 1 - Immediate compensating controls:
✓ Network segmentation (isolate database)
✓ Firewall rules (block attack vectors)
✓ IPS signature (detect exploit attempts)
✓ Enhanced monitoring (alert on anomalies)

Phase 2 - Scheduled maintenance:
✓ Coordinate with SLA exception process
✓ Schedule during planned maintenance window
✓ Apply patch during approved downtime
✓ Validate after patching

Compensating Control Implementation:

Network controls:
1. Move database to isolated VLAN
2. Update firewall rules:
   - Block port used by exploit
   - Allow only application servers
3. Deploy IPS signature for CVE-2023-XXXX

Monitoring:
1. Alert on connection attempts to vulnerable port
2. Log all database access
3. Enable database audit logging

Access controls:
1. Review and restrict database access
2. Require MFA for admin access
3. Remove unnecessary accounts

Exception Documentation:

CVE: CVE-2023-XXXX
System: PROD-DB-01
Risk: Critical (9.8)
Status: Compensating controls active

Justification:
- SLA constraint prevents immediate patching
- Compensating controls reduce risk
- Patch scheduled for maintenance window

Controls:
- Network isolation: VLAN 999
- Firewall rule: FW-2023-1234
- IPS signature: SIG-CVE-2023-XXXX
- Enhanced monitoring: SIEM alert 5678

Residual risk: Medium (exploitability reduced)
Approver: [CISO signature]
Patch date: [Next maintenance window]
Review: Weekly until patched

Validation Plan:

After patch applied:
1. Verify patch version installed
2. Run vulnerability scan
3. Confirm CVE-2023-XXXX resolved
4. Test database functionality
5. Remove compensating controls
6. Document completion

Key insight: When immediate patching isn't possible, compensating controls reduce risk while maintaining availability. However, compensating controls are temporary—schedule patching at earliest opportunity. Document everything for audit trail.

Key Terms

vulnerability remediationpatchingcompensating controlsvulnerability responsesegmentationremediation validationexception handling

Common Mistakes

Compensating controls as permanent solution—they're temporary measures. Patch as soon as possible.
No validation after patching—without verification, you don't know if the fix worked.
Undocumented exceptions—accepted risks must be documented, approved, and reviewed periodically.
Patching without testing—test patches in lab first to avoid production outages.

Exam Tips

Patching is preferred remediation. Use compensating controls only when patching isn't possible.
Compensating controls must address the same risk, be documented, monitored, and have review dates.
Validation = confirm fix works. Rescan after patching to verify vulnerability resolved.
Exception/acceptance requires: documentation, business justification, compensating controls, approval.
Segmentation can limit exposure while waiting for patch—reduce attack surface.
Change management process applies to patches—test before production deployment.

Memory Trick

  • Remediation Options - "PCSE":
  • Patching (fix the vulnerability)
  • Compensating controls (alternative protection)
  • Segmentation (limit exposure)
  • Exception (document and accept)
  • Compensating Control Requirements - "DIVE":
  • Documented
  • Independently verified
  • Validated effectiveness
  • Expiration date set
  • Patch Management Process - "IATSRVD":
  • Identify patches available
  • Assess applicability
  • Test in lab
  • Schedule deployment
  • Roll out to production
  • Verify installation
  • Document completion

Validation Rule: "Patched without Verification = Hope, not security" Always rescan after remediation

  • Exception Documentation - "VJCAR":
  • Vulnerability details
  • Justification for exception
  • Compensating controls
  • Approver signature
  • Review date

Test Your Knowledge

Q1.A legacy system cannot be patched due to vendor end-of-life. What is the BEST approach?

Q2.After applying a security patch, what should be done to confirm remediation?

Q3.A critical patch requires system downtime that would violate SLA. What is the FIRST action?

Want more practice with instant AI feedback?

Continue Learning

Ready for the Exam?

See exactly where you stand on this concept and 182 others.

99% pass rate · Pass guarantee