This document is under active development and has not been finalized.
Skip to content

Vulnerability Detection & CVE Monitoring

Scanning Program

Infrastructure Scanning

MethodTool CategoryIntervalScope
Network scanPort scanner, service detectionWeeklyAll reachable IP ranges
Vulnerability scanTrivy, OpenVAS or equivalentWeeklyServers, containers, network devices
Compliance scanConfiguration auditMonthlyHardening guidelines, CIS Benchmarks

Application Scanning

MethodTool CategoryIntervalScope
SAST (Static Analysis)Code analysis in CI/CDOn every commitIn-house developments
Dependency scanDependabot, TrivyContinuous (automated)All software dependencies
Container scanTrivyOn every buildDocker images

CRA SYNERGY

Product-related vulnerability scanning (SBOM generation, multi-engine scanning with Trivy + Grype + OSV-Scanner) is documented in the CRA Compliance Documentation. NIS2 scanning focuses on infrastructure and operational systems.

CVE Monitoring

Sources

SourceTypeRelevance
NVD (National Vulnerability Database)CVE databaseAll deployed products
BSI advisoriesAdvisories, security noticesInfrastructure and standard software
Vendor advisoriesManufacturer notificationsDeployed products
GitHub Security AdvisoriesDependency alertsOpen-source dependencies
CERT-BundWarning noticesCritical infrastructure

Assessment Flowchart

CVE published
  → Relevance check: Is the affected product deployed in our environment?
    → Yes: CVSS score + contextual assessment
      → Critical/High: Immediate escalation to IT Ops
      → Medium: Include in patch cycle
      → Low: Next release cycle
    → No: Archive

Vulnerability Tracking

Each identified vulnerability is documented with the following fields:

FieldDescription
IDCVE number or internal ID
Affected systemHostname, application, component
CVSS scoreOriginal assessment
Contextual assessmentAdjustment for our environment (reachable? exploitable?)
StatusOpen / In Progress / Resolved / Accepted
MeasurePatch, workaround, configuration change
DeadlinePer patch management deadlines
ResponsibleAssigned administrator or developer

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT