Skip to McMaster Navigation Skip to Site Navigation Skip to main content
McMaster logo

Vulnerability Management

Vulnerabilities are software bugs that compromise information assurance, affecting confidentiality, integrity, and availability. Threat actors are constantly searching for new vulnerabilities to exploit, aiming to disrupt services or gain unauthorized access to systems and data. Consequently, a server deemed secure today may be at risk tomorrow as new vulnerabilities are discovered.

Managing vulnerabilities is a critical aspect of regular server and service maintenance. Timely installation of vendor patches, bug fixes, and secure configurations are essential steps to prevent threat actors from compromising your server. The IT Security team ensures your server’s security by notifying you of any issues that require attention. We use the Vulnerability Management Standard Operating Procedure to alert you to missed patches or necessary TLS configuration updates.

Scope

The Vulnerability Management Standard Operating Procedure is generally applicable to any system on the McMaster University network, or any system managed by or on behalf of the University. In short, any server that handles McMaster information. More specifically, this procedure is intended to mitigate vulnerabilities on high-risk systems, such as:
  • Systems to which anyone on the internet can connect
  • Systems that collect credentials or leverage McMaster centralized authentication and authorization
  • Systems that handle credit card transactions
  • Systems that handle personally identifiable information (PII), personal health information (PHI), or any information that can be classified as confidential or restricted.

Workflow

vulnerability management workflow diagram

Identify Vulnerabilities

The IT Security team uses a number of tools and resources to help identify vulnerabilities on high risk systems on the McMaster network. Some of these tools include weekly vulnerability scans, or CCIRC notifications.

Notify Server Owner or Delegate

When a vulnerability has been identified on a high risk system, the IT Security team will send a notification to the system owner, and also to the technical resource to whom system maintenance responsibilities have been delegated. We will include important details about the vulnerability, such as the impact of an exploit. We will also provide our recommendations, or the recommendations of trusted experts, to mitigate the risk of exploit.

Treatment

After the owner or delegate has treated the risk, by either changing the configuration or installing an update, the IT Security team will perform follow up testing to ensure that the treatment was successful. Other treatment options include reducing the exposure by preventing public access to the server, or decommissioning the server if it is no longer in use.

Escalation

In the event that the server owner or delegate fails to respond to the notification, or to treat the risk, in a timely manner, the matter may be escalated to the risk owner. The risk owner is the executive responsible for the department to which the server owner belongs.