Zero Trust Activity 3.3.3: Vulnerability Management Program Part 2
We’ve established the foundational structure for vulnerability management (VM) in Activity 3.3.2 Part 1, aligning Component-level efforts with the DoD’s enterprise-wide VM program as defined in documents such as DoDI 8531.01. That first step set up our VM governance teams and standardized our approach to tracking public vulnerabilities. Now, in Zero Trust Activity 3.3.3: Vulnerability Management Program Part 2, we move into the vital phase of operationalizing and significantly expanding the scope of this program.
This activity is about deepening the source of vulnerability intelligence and formalizing the response. It directs the DoD Enterprise to establish processes for managing the disclosure of vulnerabilities in DoD maintained and operated services, whether they are publicly or privately accessible. This is where active engagement with the security researcher community and structured handling of vulnerabilities comes into play, building on DoDI 8531.01’s mention of the Vulnerability Disclosure Program (VDP). Simultaneously, DoD Components are to expand their vulnerability management program to track and manage closed vulnerability repositories, such as those from the Defense Industrial Base (DIB-VDP), CERT Coordination Center (CERT/CC), and other trusted, often non-public, sources. Critically, this phase also includes the development of concrete vulnerability remediation plans.
This activity is essential because it moves beyond just identifying public vulnerabilities to proactively addressing vulnerabilities from all sources, including those reported directly or shared in controlled environments, and ensuring a systematic approach to fixing them.
The outcomes for Activity 3.3.3 Part 2 highlight this advanced operationalization:
- Components utilize controlled (e.g., DIB-VDP, CERT) sources for tracking vulnerabilities.
- Enterprise sets minimum standards for vulnerability management program accepting external/public disclosures for managed services.
- Vulnerability remediation plans are developed.
The ultimate end state emphasizes a highly integrated and automated defense posture: Enterprise-established processes for automated threat sharing from controlled sources are integrated into Component vulnerability management programs. This enables rapid dissemination of critical vulnerability intelligence and action.
Solutions for Achieving Vulnerability Management Program Part 2
Implementing Activity 3.3.3 Part 2 requires a blend of defined processes for sensitive information handling, advanced threat intelligence integration, and robust remediation orchestration:
- Establishing Processes for Vulnerability Disclosure Management: Define and implement clear processes for receiving, validating, tracking, and coordinating the disclosure of vulnerabilities found in DoD-maintained and operated services, whether reported by internal teams, external security researchers (VDP), or trusted partners. This includes managing communication with reporters and internal stakeholders. DoDI 8531.01 emphasizes developing and maintaining a coordinated VDP.
- Integrating with Closed Vulnerability Repositories and Threat Intelligence: Beyond public sources (like CVE/NVD), establish secure connections and processes to ingest vulnerability data from controlled, non-public sources. This data is often more timely or specific to certain industries/technologies. These are commonly Threat Intelligence Platforms.
- Developing Robust Vulnerability Remediation Plans: For every identified vulnerability, particularly those from controlled sources or public disclosures, develop detailed remediation plans outlining specific steps, responsible teams, required resources, and target timelines (SLAs). This directly addresses Step 4: Remediation and Mitigation in the DoD VM process.
- Operationalizing Automated Threat Sharing: Implement automated mechanisms to share vulnerability intelligence and remediation guidance from controlled sources directly into Component vulnerability management programs and operational security tools. This fulfills the end state goal. This can be achieved by leveraging the Security Orchestration, Automation, and Response (SOAR) platforms to automate notification, ticket creation, and triggering automated remediation actions.
Relevant Technologies and Tools:
Successfully implementing Activity 3.3.3 relies on advanced VM platforms, robust threat intelligence, and automation tools:
- Vulnerability Management (VM) Platforms: Central to tracking, managing, and reporting on vulnerabilities from all sources. Examples include Tenable.io, Qualys VMDR, Rapid7 InsightVM.
- Threat Intelligence Platforms (TIPs): Aggregate, process, and distribute vulnerability intelligence from various sources, including controlled feeds. Examples include Recorded Future, Mandiant Advantage, ThreatConnect.
For the Technical Buyer:
Activity 3.3.3 Part 2 is about fully operationalizing your vulnerability management program within the well-defined DoD enterprise framework. It’s the critical next step after establishing your governance and basic public vulnerability tracking. For technical buyers, success here means implementing robust processes for managing vulnerability disclosures, integrating intelligence from vital controlled sources like DIB-VDP and CERT, and, importantly, developing concrete remediation plans. This activity accelerates the flow of critical threat intelligence and solidifies your ability to proactively fix vulnerabilities, leveraging automated threat sharing to enhance your overall Zero Trust posture and ensure a more resilient defense against software weaknesses.
Pillar: Application & Workload
Capability: 3.3 Software Risk Management
Activity: 3.3.3 Vulnerability Management Program Part 2
Phase: Target Level
Predecessor(s): 3.3.2 Vulnerability Management Program Part 1Successor(s): 3.2.3 Automate Application Security & Code Remediation Part 1








