Building a Vulnerability Management Program: From Ad-Hoc Scanning to Mature Operations | Lorikeet Security Skip to main content
Back to Blog

Building a Vulnerability Management Program: From Ad-Hoc Scanning to Mature Operations

Lorikeet Security Team March 8, 2026 12 min read

Most companies have vulnerability scanning. Few have vulnerability management. The difference is the gap between running a tool that produces a list of findings and operating a program that systematically reduces your organization's risk exposure over time. Scanning tells you what is wrong. A vulnerability management program ensures something actually gets done about it.

This guide covers how to build a vulnerability management program that moves beyond scan-and-forget, with practical frameworks for prioritization, remediation SLAs, metrics that demonstrate progress, and compliance mapping for organizations subject to SOC 2, PCI DSS, or ISO 27001.


The Vulnerability Management Lifecycle

An effective vulnerability management program operates as a continuous cycle with four phases. Skipping any phase means the program is not actually managing vulnerabilities -- it is just generating reports.

Phase 1: Discover

Discovery is about finding vulnerabilities across your entire environment. This requires a combination of automated scanning, manual testing, and continuous monitoring.

The discovery gap: If your vulnerability management program only includes automated scanning, you are missing approximately 30-40% of your actual vulnerabilities. Business logic flaws, complex authentication bypasses, and chained attack paths require human expertise to identify. This is why penetration testing is a necessary complement to scanning, not a replacement.

Phase 2: Prioritize

A typical vulnerability scan of a mid-size environment produces hundreds or thousands of findings. Without prioritization, engineering teams are overwhelmed and nothing gets fixed, or resources are spent fixing low-risk issues while critical vulnerabilities remain exploitable.

Risk-based prioritization considers three factors:

  1. Vulnerability severity. The CVSS score provides a baseline, but it measures theoretical severity in isolation. A CVSS 9.8 vulnerability on an internal-only development server is lower risk than a CVSS 7.5 vulnerability on your internet-facing payment processing application
  2. Asset criticality. What is the business impact if this asset is compromised? Systems handling customer data, payment processing, or authentication are higher priority than internal documentation servers
  3. Exploitability context. Is the vulnerability being actively exploited in the wild? Is there a public exploit available? Is the asset internet-facing? These factors dramatically affect the real-world risk of a given vulnerability
Priority Level Criteria Remediation SLA
Critical CVSS 9.0+, internet-facing, active exploitation or public exploit, high-value asset 24-72 hours
High CVSS 7.0-8.9, internet-facing or high-value asset, exploit available 7-14 days
Medium CVSS 4.0-6.9, or high CVSS on low-criticality internal asset 30-60 days
Low CVSS below 4.0, informational findings, internal-only with limited impact 90 days

Phase 3: Remediate

Remediation is where most vulnerability management programs break down. Findings are identified and prioritized, but fixing them requires engineering time, which competes with feature development and other business priorities.

Strategies that make remediation actually happen:

Phase 4: Verify

Verification confirms that remediation actually resolved the vulnerability. This step is frequently skipped, which means organizations believe they have reduced risk when in fact the fix was incomplete, the patch did not apply correctly, or a deployment reverted the change.


Metrics That Actually Matter

The value of a vulnerability management program is demonstrated through metrics that show risk reduction over time. Vanity metrics (total vulnerabilities found) are less meaningful than operational metrics that demonstrate program effectiveness.

Metric What It Measures Target
Mean time to remediate (MTTR) Average time from discovery to verified fix Below SLA thresholds for each severity
SLA compliance rate Percentage of findings remediated within SLA Above 90% for critical/high
Vulnerability aging Count of open findings past SLA Zero critical/high past SLA
Scan coverage Percentage of assets being scanned regularly 100% of production assets
Risk score trend Aggregate risk score over time Downward trend quarter over quarter
Recurrence rate Percentage of fixed vulnerabilities that reappear Below 5%

These metrics serve dual purposes: they demonstrate program effectiveness to leadership and board members, and they provide the evidence that compliance auditors need to see. A downward risk score trend and high SLA compliance rate tell auditors that your vulnerability management program is not just documented but genuinely operational.


Compliance Mapping: VM Program Requirements by Framework

Every major compliance framework requires some form of vulnerability management. Understanding the specific requirements ensures your program satisfies auditors without building separate processes for each framework.

SOC 2

SOC 2 CC7.1 requires organizations to implement detection and monitoring mechanisms that identify new vulnerabilities. CC3.2 requires identification and assessment of risks, including technical risks from vulnerabilities. Your vulnerability management program directly addresses both controls, and the metrics you track provide the evidence auditors need. See our guide on SOC 2 continuous monitoring requirements for detailed evidence expectations.

PCI DSS

PCI DSS is the most prescriptive framework regarding vulnerability management. Requirement 6.3 mandates identification and management of security vulnerabilities. Requirement 11.3 requires regular vulnerability scanning, including quarterly ASV scans for external systems and internal scanning after significant changes. Requirement 6.3.3 specifically requires patching critical vulnerabilities within one month of release.

ISO 27001

ISO 27001:2022 Annex A 8.8 requires technical vulnerability management, including timely identification and remediation of vulnerabilities. The control expects a documented process, defined roles, and evidence of consistent execution. Your vulnerability management program's SLA framework and metrics reporting directly support this control requirement.

Multi-framework efficiency: A single well-designed vulnerability management program can satisfy SOC 2, PCI DSS, and ISO 27001 requirements simultaneously. The key is designing your SLA thresholds to meet the most stringent requirement (PCI DSS's one-month critical patch window) and structuring your evidence collection to produce framework-mapped reports. Lorikeet Security's Compliance Package at $42,500 per year includes the compliance pentest, gap assessment, and auditor-ready reporting that integrates with your VM program.


Why Scanning Alone Is Not Enough

Vulnerability scanning is one input to a vulnerability management program, but treating scanning as the entire program is a common and costly mistake. Here is what scanning misses:

This is why a mature vulnerability management program includes both automated scanning (breadth and frequency) and penetration testing (depth and expertise). The Lorikeet Security Offensive Security Bundle at $37,500 per year provides both: quarterly automated vulnerability scanning across your infrastructure plus annual penetration testing (two web application pentests, one network pentest, one API assessment) that identifies the issues automated tools cannot find. The bundle also includes continuous attack surface management to ensure your scanning program covers all assets, not just the ones you know about.


Building Your VM Program: A Practical Roadmap

You do not need to build a perfect vulnerability management program on day one. Start with the fundamentals and mature over time.

Month 1: Foundation

Months 2-3: Operationalize

Months 4-6: Mature

Ongoing: Continuous Improvement

A vulnerability management program is never complete. Each quarter, review your metrics, assess whether SLA thresholds need adjustment, evaluate new scanning tools and techniques, and incorporate lessons learned from penetration tests and security incidents. The goal is a measurable downward trend in risk exposure over time.


Getting Started

If you do not have a vulnerability management program today, the fastest way to start is with two steps: run an attack surface discovery scan to understand the true scope of what you need to protect, and conduct a penetration test to establish a baseline of your current vulnerability posture. These two inputs give you the asset inventory and the findings list needed to build your prioritization and remediation processes.

Lorikeet Security's ASM Personal at $29.99 per month provides continuous asset discovery and vulnerability scanning as the foundation for your VM program. Pair that with an annual penetration test (web application pentests from $7,500, network pentests from $8,000) for the depth that scanning cannot provide. Or start with the Offensive Security Bundle at $37,500 per year to get the full stack: quarterly scanning, annual pentests across multiple vectors, and continuous ASM in a single package.

Ready to Build a Real Vulnerability Management Program?

Our Offensive Security Bundle includes quarterly vulnerability scanning, annual penetration testing, and continuous ASM -- the foundation of an effective VM program -- for $37,500 per year.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!