Vulnerability Response and Remediation (Part 2) (Domain 4)
Not all vulnerabilities can be patched right away, and in these cases, compensating controls, segmentation, and exceptions become essential components of a realistic remediation strategy. In this episode, we discuss how organizations can use host firewalls, access control lists, and network isolation to contain vulnerable systems while planning for a longer-term fix. We also explore how to formally document and justify exceptions when remediation is deferred—something often required for compliance audits. These exceptions should include timelines, risk assessments, and mitigating measures to prevent exploitation during the interim period. The conversation includes a look at intrusion prevention systems (IPS), protocol filtering, and behavioral restrictions as layered defenses that reduce exposure. When full remediation isn’t immediately possible, mitigation steps must still lower the likelihood of compromise. Security is rarely perfect, but it must always be intentional.
