Vulnerability Management Procedure
Vulnerability Management Procedure
Management
Procedure
VULNERABILITY MANAGEMENT PROCEDURE
Document Control
Role NAME
Classification INTERNAL
Document Title Vulnerability Management Procedure
Document Owner Information Security Department
Author(s) Security Services
Document Date 15/08/2023
Reviewed By Abdullah Alahmari
Approval
Department Role Name Signature
Information Security IS Director Mohammed Al-
Department Washmi
CEO Office CEO Dr.Bandar AlHaqbani
Change Record
Date Author Version Change Reference
15/08/2023 Manar Alshehri 1.0 Initial version
24/08/2023 Abdullah Alahmari 1.0 Final review
24/08/2023 Mohammed Al- 1.0 Final review
Washmi
Distribution
Department Role Name
Share Services Division
Technical Deilivery Division
Development Division
TCC Internal P a g e 2 | 13
VULNERABILITY MANAGEMENT PROCEDURE
Proprietary Information:
TCC Internal P a g e 3 | 13
VULNERABILITY MANAGEMENT PROCEDURE
Table of Contents
1. Purpose....................................................................................................................................5
2. Scope........................................................................................................................................5
3. Procedure................................................................................................................................5
4. Flow Chart............................................................................................................................11
5. Associated Documents..........................................................................................................12
6. Appendix A - Vulnerability Severity criteria based on CVSS.........................................12
7. Appendix B – Resolution Rating.........................................................................................12
8. Appendix C - Vulnerability Remediation Timeframe......................................................13
9. Document Repository...........................................................................................................13
TCC Internal P a g e 4 | 13
VULNERABILITY MANAGEMENT PROCEDURE
1. Purpose
The purpose of the underlying procedure is to establish requirements for controlled access
(temporary or permanent) to the resources of TCC that contain sensitive or limited access data.
This procedure describes the method to describe and implement vulnerability management
within TCC.
2. Scope
3. Procedure
TCC Internal P a g e 5 | 13
VULNERABILITY MANAGEMENT PROCEDURE
TCC Internal P a g e 6 | 13
VULNERABILITY MANAGEMENT PROCEDURE
TCC Internal P a g e 7 | 13
VULNERABILITY MANAGEMENT PROCEDURE
TCC Internal P a g e 8 | 13
VULNERABILITY MANAGEMENT PROCEDURE
TCC Internal P a g e 9 | 13
VULNERABILITY MANAGEMENT PROCEDURE
TCC Internal P a g e 10 | 13
VULNERABILITY MANAGEMENT PROCEDURE
4. Flow Chart
TCC Internal P a g e 11 | 13
VULNERABILITY MANAGEMENT PROCEDURE
5. Associated Documents
SEVERITY DESCRIPTION
The plugin's highest vulnerability CVSSv2 score is
Very High
10.0
The plugin's highest vulnerability CVSSv2 score is
High
between 7.0 and 9.9
The plugin's highest vulnerability CVSSv2 score is
Medium
between 4.0 and 6.9
The plugin's highest vulnerability CVSSv2 score is
Low and Very Low
between 0.1 and 3.9
The plugin's highest vulnerability CVSSv2 score is
Info 0. Or, the plugin does not search for
vulnerabilities.
RESOLUTION DESCRIPTION
Criticality of associated system is Mission Critical or Critical
Quick
Quick to resolve, with simple change to device or system configurations
Criticality of associated system is Medium
Planned
Could cause disruption to services
Criticality of associated system is Low
Would most likely cause disruption to network services, and possibly the
Involved
modification of other network device configurations
Would require initiating a project or involve external party (e.g. vendor)
TCC Internal P a g e 12 | 13
VULNERABILITY MANAGEMENT PROCEDURE
Severity
Resolution Low and
Very High High Medium Info
Very Low
Within 2
Quick Within 2 days Within 5 days Within 10 days
months Based on
Within 10 Within 20 Within 6 Technical
Planned Within 30 days
days days months Owner
Within 30 Within 45 Within 2 Within 12 Judgment
Involved
days days months months
9. Document Repository
TCC Internal P a g e 13 | 13