Vulnerability and patch management is the systematic process of identifying weaknesses in systems and eliminating or mitigating them before they can be exploited. For the CISSP exam, these are tested as management processes — not as technical procedures — with emphasis on the lifecycle, governance requirements (especially change management), and strategic decisions like zero-day response. The exam rewards candidates who understand that patch management without change management is as dangerous as no patch management at all.

Vulnerability Management Lifecycle

The vulnerability management lifecycle is a continuous cycle of four core activities.

Discover: identify assets and their vulnerabilities through automated scanning, manual assessment, threat intelligence, and vendor notifications. Discovery tools (Nessus, Qualys, Rapid7) scan systems against databases of known vulnerabilities (CVE, NVD) and identify misconfigurations, missing patches, and weak configurations. Asset discovery is a prerequisite to vulnerability scanning — you cannot scan what you do not know exists.

Prioritise: rank discovered vulnerabilities by risk to determine remediation order. Not all vulnerabilities can be remediated simultaneously, and not all vulnerabilities pose equal risk. Prioritisation factors include severity (CVSS score), exploitability (is there a public exploit? is it being actively used in the wild?), asset criticality (is this vulnerability on a system that supports critical business functions?), and exposure (is the vulnerable system internet-facing or isolated on an internal network?).

Remediate: apply the appropriate fix. Remediation options in decreasing order of preference are: patching (applying the vendor-supplied patch), configuration change (changing settings to eliminate the vulnerability without a patch), compensating control (implementing a control that reduces the risk without eliminating the vulnerability), and risk acceptance (formally accepting the residual risk when remediation is not feasible).

Verify: confirm that the remediation was successful. Re-scan the system after patching to verify that the vulnerability no longer appears. Verification is a critical step that is often skipped under operational pressure. Unverified patches may not have been applied correctly, may have been rolled back by another process, or may not have fully addressed the vulnerability.