The NIST model defines controls and best practices that allow agencies to thoughtfully view the subject of vulnerability management holistically. No one size fits all mandates here. NIST Cybersecurity Framework guidance recommends the following actions as part of an overall vulnerability management and risk mitigation strategy:
- Asset vulnerabilities are identified and documented
- Threat and vulnerability information is received from information sharing forums and sources
- Threats both internal and external are identified and documented
- Threats, vulnerabilities, likelihoods and impacts are used to determine risk
- Risk responses are identified and prioritized
- Vulnerability management plan is developed and implemented
- Event Data are aggregated and correlated from multiple sources and sensors
- Vulnerability scans are performed
- Newly identified vulnerabilities are mitigated or documented as accepted risks
SP 800-40 Rev. 3 - Guide to Enterprise Patch Management Technologies (2013)