Improving your response to vulnerability management
Summary
The NCSC revisits its earlier method for distinguishing between ‘forgivable’ and ‘unforgivable’ vulnerabilities and recommends reframing that debate by using an ‘ease of implementation’ score for mitigation actions. The approach quantifies how straightforward it is to apply mitigations — accounting for technical feasibility, cost and knowledge required — and urges organisations to prioritise easy, systematic fixes that address root causes.
The blog gives practical advice for three audiences: vulnerability researchers (coordinate disclosures, share detection/fix guidance), developers (perform root cause analysis, regression tests, clear customer communication, publish CVEs and vuln-enrichment data), and larger organisations (adopt a maturity framework mapping Strategic, Operational and Reputational risk to Basic/Advanced/Expert mitigation activities). It emphasises learning from incidents so the same mistakes are not repeated and encourages working with national bodies like the NCSC when exploitation occurs.
Key Points
- Replace the loaded ‘unforgivable’ label with an ‘ease of implementation’ score that captures technical, cost and knowledge factors.
- Researchers should coordinate disclosure, suggest fixes, and help maintainers avoid repeat mistakes, especially for smaller/open-source projects.
- Developers should perform root cause analysis, run automated regression tests, expedite realistic mitigations, and communicate clearly with customers.
- Publish CVEs and include vuln-enrichment information to support SSVC-based responses and stakeholder triage.
- Larger organisations should adopt a maturity framework tying Strategic, Operational and Reputational risk to Basic/Advanced/Expert mitigation activities to improve long-term resilience.
- When exploitation is observed, engage national cyber agencies (eg NCSC) to assess impact, identify exposure and amplify mitigation advice.
Context and relevance
This guidance is practical and directly relevant to security teams, developers, open-source maintainers and vendors. It aligns with broader industry moves towards more structured vulnerability prioritisation (SSVC, vuln-enrichment) and emphasises systemic fixes over one-off patches. The focus on root cause analysis and organisational memory helps reduce repeat vulnerabilities and improves overall risk posture.
Why should I read this?
Short version: if you patch stuff but keep seeing the same bugs crop up, this is worth five minutes. It gives a sensible way to stop firefighting and start fixing the underlying problems — plus concrete tips for researchers, devs and teams to make that happen.
Source
Source: https://www.ncsc.gov.uk/blog-post/improving-your-response-to-vulnerability-management
Author: Ollie N, Head of Vulnerability Management Team, NCSC