Contacts & Dates:
UNIVERSITY STANDARD STATEMENT
This standard establishes the process, severity levels, and remediation schedules for security vulnerabilities.听
REASON FOR STANDARD
Vulnerability Management is a security measure that can help identify system and application flaws that could be exploited. By establishing expectations for addressing these flaws, 国产原创 can proactively address potential compromise paths and can help protect its systems and the data on them.
Note: Vulnerability management is not the same as patch management. The two are related; however, not all patches address security vulnerabilities and not all vulnerabilities are treated with a patch.
The Office of Cybersecurity will review this standard biennially with feedback collected from representatives across VU to understand new concerns and dynamic requirements to best serve the VU community and adhere to VU Information Security Principles listed in the Information Security Policy.
SCOPE AND AUDIENCE
This standard applies to the entire 国产原创 community including, but not limited to, faculty, staff, students, contractors, post-doctoral fellows, temporary employees, and volunteers (collectively called 鈥淰U Community Members鈥). All IT Assets used to collect, transmit, process, store, or host institutional data are in-scope for this policy.
DEFINITIONS
STANDARD
A. VUNERABILITY MANAGEMENT PROCESS
The Office of Cybersecurity shall leverage the following Vulnerability Management process:
B. VULNERABILITY SEVERITY LEVELS
The Office of Cybersecurity uses the (CVSS) as outlined by the National Vulnerability Database (NVD) to assess the severity of identified vulnerabilities and to assign remediation effort priority.
Table 1. Vulnerability Severity Levels
| Vulnerability Level | CVSS | Risk Exposure | Characteristics | Schedule |
| Vulnerability Level 1 | (0.1-6.9) | Low - Moderate | Standard remediation | 30 calendar days |
| Minor impact | ||||
| Unlikely to be exploited | ||||
| Resulting in limited access | ||||
| Vulnerability Level 2 | 听(7.0-10) | High | Priority remediation | 15 calendar days |
| Moderate to Major impact | ||||
| All vendor vulnerability notifications | ||||
| Possible to Likely exploitation | ||||
| Vulnerability Level 3 | Determined by Cybersecurity | Critical | Emergency remediation | 3 calendar days |
| Major impact | ||||
| Threat intelligence of imminent threat |
IT Asset Owners, or IT Asset Stewards when duties are delegated, are responsible for remediating vulnerabilities on IT Assets under their purview within the schedule outlined in Table 1. Remediation activities may involve patching, changing configuration settings, turning off or uninstalling unneeded services or applications, or moving an asset鈥檚 location either on the network or physically. When remediating, IT Asset Owners and/or Stewards should create rollback procedures and test as appropriate. Automated processes (e.g., automatic patching) are recommended, where technically feasible.
The Office of Cybersecurity has the authority to increase or decrease a vulnerability鈥檚 severity level to account for institutional considerations such as available compensating controls, sensitivity of the data housed on the IT Asset, or criticality of the asset to the VU mission.
IT Asset Owners that cannot adhere to the outlined schedule must seek an exception and must have compensating controls in place to lower the risk of exploitation.
EXCEPTIONS
On a rare occasion, a security policy exception may be considered depending on the impact to the university mission and security risk(s) introduced. Exception requests must be submitted to the VU Chief Information Security Officer for evaluation and risk assessment. The CISO, or a delegate, will grant or deny the request based on the level of risk.听
ENFORCEMENT
Any VU community member that violates this policy may be subject to disciplinary action up to and including termination. The Chief Information Security Officer will refer violations to university units (e.g., Student Accountability Office, Human Resources, and Deans) as appropriate. Violations may also constitute a violation of state or federal law and individuals shall be accountable as applicable.
FORMS AND TOOLS
N/A
FREQUENTLY ASKED QUESTIONS
N/A
HISTORY
| Review Date |
Summary of Changes |
| September 2023 | No changes |
| February 2025 | Added a review cadence |