OWASP Vulnerability Management Guide (OVMG) - June 1, 2020
16
3.4.5
Document each exception
and store it in the company’s
audit system
The ticketing system may be used for this as well, be aware of information
sensitivity and apply labels accordingly.
3.4.6
Create an appropriate policy
You can add vulnerability exceptions to your vulnerability management policy,
or you can create a new one.
3.4.7
Communicate this policy to
all employees
How to do this should be specified by your organizational governance.
3.4.8
Have vulnerability exception
solicitors asking the
executive authority for an
approval
every time
If the vulnerability exceptions process is too easy
– it could become a
loophole. Whoever seeks an exception should solicit a higher authority to
approve it.
End Goal: you must ensure that all non-compliance is approved by senior management and documented in the company-
wide repository. Vulnerability exceptions must have an expiration date, after which they should be revised. Vulnerability
exceptions must include compensating controls that prevent vulnerability exploitation.
OWASP Vulnerability Management Guide (OVMG) - June 1, 2020
20
IV. Reference Table
Term
Definition
Asset
A device, a system, web or mobile application, a person
Audit(able) trail
Logs or records that provide chronological documentary evidence
CVE
Common Vulnerabilities and Exposures
CVSS
The Common Vulnerability Scoring System
FP
False Positive
KPI
Key Performance Indicator
KB
Knowledge Base
OWASP Top 10
https://owasp.org/www-project-top-ten/
OWASP Juice Shop
https://owasp.org/www-project-juice-shop/
OWASP Mutillidae
https://github.com/webpwnized/mutillidae
PCI DSS
Payment Card Industry Data Security Standard
RACI
Responsible, accountable, consulted and informed
SCADA
Supervisory control and data acquisition
SE
Social
Engineering
SME
Subject Matter Expert