Vulnerability Management Program Implementation

In this project, we simulate the implementation of a comprehensive vulnerability management program, from inception to completion.

Inception State: the organization has no existing policy or vulnerability management practices in place.

Completion State: a formal policy is enacted, stakeholder buy-in is secured, and a full cycle of organization-wide vulnerability remediation is successfully completed.

Vulnerability Management Project Diagram

Technology Utilized


Table of Contents


Step 1) Vulnerability Management Policy Draft Creation

This phase focuses on drafting a Vulnerability Management Policy as a starting point for stakeholder engagement. The initial draft outlines scope, responsibilities, and remediation timelines, and may be adjusted based on feedback from relevant departments to ensure practical implementation before final approval by upper management.

Vulnerability Management Policy: Draft

Step 2) Mock Meeting: Policy Buy-In (Stakeholders)

In this phase, a meeting with the server team introduces the draft Vulnerability Management Policy and assesses their capability to meet remediation timelines. Feedback leads to adjustments, like extending the critical remediation window from 48 hours to one week, ensuring collaborative implementation.

VM Policy Server Team Buy In Transcript

Step 3) Policy Finalization and Senior Leadership Sign-Off

After gathering feedback from the server team, the policy is revised, addressing aggressive remediation timelines. With final approval from upper management, the policy now guides the program, ensuring compliance and reference for pushback resolution.

Vulnerability Management Policy: Production

Step 4) Mock Meeting: Initial Scan Permission (Server Team)

The team collaborates with the server team to initiate scheduled credential scans. A compromise is reached to scan a single server first, monitoring resource impact, and using just-in-time Active Directory credentials for secure, controlled access.

Server Team Meeting: Initial discovery scan Transcript

Step 5) Initial Scan of Server Team Assets

In this phase, an insecure Windows Server is provisioned to simulate the server team's environment. After creating vulnerabilities, an authenticated scan is performed, and the results are exported for future remediation steps.

Initial Scan in Tenable

Scan 1 - Initial Scan

Step 6) Vulnerability Assessment and Prioritization

We assessed vulnerabilities and established a remediation prioritization strategy based on ease of remediation and impact. The following priorities were set:

  1. Third Party Software Removal (Wireshark)
  2. Windows OS Secure Configuration (Protocols & Ciphers)
  3. Windows OS Secure Configuration (Guest Account Group Membership)
  4. Windows OS Updates
  5. Residual Critical or High Vulnerabilities

Step 7) Distributing Remediations to Remediation Teams

The server team received remediation scripts and scan reports to address key vulnerabilities. This streamlined their efforts and prepared them for a follow-up review.

Example Email of Distributing Remediations

Step 8) Mock Meeting: Post-Initial Discovery Scan (Server Team)

The server team reviewed vulnerability scan results, identifying outdated software, insecure accounts, and deprecated protocols. The remediation packages were prepared for submission to the Change Control Board (CAB).

Server Team Meeting: Post-Initial Discover Scan Transcript

Step 9) Mock CAB Meeting: Implementing Remediations

The Change Control Board (CAB) reviewed and approved the plan to remove insecure protocols and cipher suites. The plan included a rollback script and a tiered deployment approach.

CAB Meeting with Server Team Transcript
Technical Addendum: Rollback & Testing Strategy

Step 10) Remediation Effort

Remediation Round 1: Outdated Wireshark Removal

The server team used a PowerShell script to remove outdated Wireshark. A follow-up scan confirmed successful remediation.

View PowerShell: Wireshark removal script
Second Scan

Scan 2 - Third Party Software Removal

Remediation Round 2: Insecure Protocols & Ciphers

The server team used PowerShell scripts to remediate insecure protocols and cipher suites. A follow-up scan verified successful remediation.

View PowerShell: Disable insecure protocols, enable secure ones
View PowerShell: Disable insecure ciphers, enable secure ones
Third Scan

Scan 3 - Ciphersuites and Protocols

Remediation Round 3: Guest Account Group Membership

The server team removed the guest account from the administrator group. A new scan confirmed remediation.

View PowerShell: Guest Account Group Membership Remediation
Fourth Scan

Scan 4 - Guest Account Group Removal

Remediation Round 4: Windows OS Updates

Windows updates were re-enabled and applied until the system was fully up to date. A fourth scan verified the changes.

Fifth Scan

Scan 5 - Post Windows Updates

Remediation Round 5: WinVerifyTrust Signature Validation Vulnerability (CVE-2013-3900)

Despite Windows Update being fully up to date, a vulnerability with a severity of high remained. I designed a script to remediate this vulnerability in Powershell, then ran a final scan to ensure the vulnerability was fixed.

View PowerShell: Remediate CVE-2013-3900 (WinVerifyTrust)
Sixth Scan

Scan 6 - Remediate CVE-2013-3900


First Cycle Remediation Effort Summary

The remediation process reduced total vulnerabilities by 80%, from 29 to 5. Critical vulnerabilities were resolved by the second scan (100%), and high vulnerabilities were resolved by the 6th (100%). Mediums were reduced by 76%. In an actual production environment, asset criticality would further guide future remediation efforts.

Summary Chart

Remediation Data

On-going Vulnerability Management (Maintenance Mode)

After completing the initial remediation cycle, the vulnerability management program transitions into Maintenance Mode. This phase ensures that vulnerabilities continue to be managed proactively.