CMMC v2.11 Practices

RA.L2-3.11.3  

Reference: CMMC v2.11

Family: RA

Level Introduced: 2

Title: Vulnerability Remediation

Practice:
Remediate vulnerabilities in accordance with risk assessments.

Further Discussion:
Not all vulnerabilities captured in a vulnerability scanner may pose the same level of risk to an organization. Prioritize mitigation efforts to close the most critical vulnerabilities first. Track all vulnerability remediation to ensure completion; also track vulnerabilities that you have determined not to remediate.

This requirement, RA.L2-3.11.3, benefits from CA.L2-3.12.2. RA.L2-3.11.3 allows remediation of vulnerabilities to take place based on the developed plans of actions for vulnerabilities from CA.L2-3.12.2.

Example
You are a system administrator. Each quarter you receive a list of vulnerabilities generated by your company’s vulnerability scanner [a]. You prioritize that list and note which vulnerabilities should be targeted as soon as possible as well as which vulnerabilities you can safely defer addressing at this time. You document the reasoning behind accepting the risk of the unremediated flaws and note to continue to monitor these vulnerabilities in case you need to revise the decision at a later date [b].

Potential Assessment Considerations
• Are the results of risk assessments used to prioritize vulnerabilities for remediation [b]?
• For any given vulnerability is action taken for remediation, acceptance, avoidance, or transference of the vulnerability risk [b]?
• Are all high risk vulnerabilities prioritized [b]?

This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.

This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.

Source: CMMC v2.11