404 On The Floor

My personal website where I blog, take notes, and do writeups on cybersecurity and digital privacy.

View on GitHub

Introduction

Welcome to my first posted note! The way I take notes is writing down the gist, then looking up any terms or concepts I didn’t understand, so my notes have footnotes where I cite my sources, give more information, and define terms. I hope to make everything on this blog understandable to someone outside of cybersecurity. If there’s something that’s confusing or poorly worded, let me know. Alright, let’s get started.


The vulnerability management lifecycle1 is similar to the Incident Management Process. This will be split into two parts: how I believe it should be done for individual projects, and the lifecycle that organizations use.

Individual Vulnerability Management Lifecycle

This is what I use to maintain this site.

1. Understand the vulnerability.

Clearly define what the vulnerability2 is and write a summary. Find the root cause3, then apply relevant mitigation strategies for the vulnerability. Here’s a list of general examples:

2. Apply temporary mitigations, if needed.

While a patch is in development, provide a temporary mitigation to stop exploitation from bad actors. Examples of this include:

Communication with your users is key. Make sure they know that this is a temporary measure and provide them with a timeline for the permanent mitigation.

3. Prioritize by risk.

Use risk assessments4 to prioritize the mitigations. Vulnerabilities affecting critical systems or ones with high exploitability should be addressed first.

4. Remediate.

Patch the vulnerability. Remember to remove the temporary mitigation as it’s no longer needed.

5. Monitor.

Continuously monitor your code, repository, and service for any anomalous behavior.


Organizational Vulnerability Management Lifecycle

The organizational version of this closely follows the Individual VM Cycle I proposed.

  1. Assess
  2. Prioritize
  3. Act
  4. Reassess
  5. Improve5

The changes include not instituting temporary mitigations, and which mitigation strategies to employ for a vulnerability, as seen below.

Common Organizational Mitigation Strategies


Footnotes

  1. Vulnerability management is the structured process of identifying, mitigating, and monitoring vulnerabilities in a system, network, and/or application(s). The vulnerability management lifecycle is the steps in this process. Source: my notes on TryHackMe Advent of Cyber 2023.

  2. A vulnerability is a flaw, loophole, oversight, or error that can be exploited to violate a system’s security. Source: my notes on the IBM Cybersecurity Analyst - Introduction to Cybersecurity Tools & Cyberattacks

  3. The root cause of a vulnerability is the fundamental reason behind its occurrence. For example, missing patches could be what causes malware to appear on a system, but this is caused by a failure of third-party patch management procedures. Source: my notes on the IBM Cybersecurity Analyst - Introduction to Cybersecurity Tools & Cyberattacks

  4. A risk assessment is the process of identifying, prioritizing, managing and monitoring risks to information systems. Source: IBM

  5. Source: IBM

  6. Single-sign on is an authentication scheme that allows a user to log in with a single ID to any one of several software systems. Source: a class I don’t have notes for, work, and Wikipedia

  7. A security information and event management system gathers all logs from all machines on the network, analyze those logs automatically, and point out anomalies. Source: my notes on the IBM Cybersecurity Analyst - Introduction to Cybersecurity Tools & Cyberattacks

  8. Network segmentation is the division of one network into smaller networks that act independently to improve network performance and security. AKA network segregation, network partitioning, and network isolation. Source: work and Cisco

published: Oct 23, 2025
word count: 944
Tagged: #infosec, #vm, #blog