Security Practices

What is Vulnerability Management?

Vulnerability management is the continuous process of identifying, classifying, remediating, and mitigating security weaknesses in software and infrastructure.

By the Hyrax team·5 min read·May 1, 2026
TL;DR
  1. 1.What is a Vulnerability?
  2. 2.The Vulnerability Management Lifecycle
  3. 3.Key Tools and Techniques
  4. 4.CVSS: Scoring Vulnerabilities
  5. 5.Continuous vs Periodic Scanning

Vulnerability management is the ongoing process of discovering, evaluating, and addressing security weaknesses before attackers can exploit them. In modern software delivery, where codebases change daily and dependencies update constantly, a systematic approach to vulnerabilities is not optional.

What is a Vulnerability?

A vulnerability is a flaw in code, configuration, or design that could allow unauthorized access, data exposure, or system compromise. Common sources include outdated dependencies, misconfigured services, insecure coding patterns, and missing patches.

The Vulnerability Management Lifecycle

  1. Discovery — scan code, containers, and infrastructure for known weaknesses
  2. Assessment — evaluate severity using CVSS scores and business context
  3. Prioritization — rank vulnerabilities by exploitability and impact
  4. Remediation — patch, upgrade, or mitigate the identified weakness
  5. Verification — confirm the fix is applied and effective
  6. Reporting — document findings and track improvement over time

Key Tools and Techniques

Effective vulnerability management combines multiple scanning approaches:

  • Static Application Security Testing (SAST) analyzes source code without execution
  • Dynamic Application Security Testing (DAST) probes running applications
  • Software Composition Analysis (SCA) audits third-party dependencies
  • Infrastructure scanning covers cloud configurations and container images

CVSS: Scoring Vulnerabilities

The Common Vulnerability Scoring System (CVSS) rates vulnerabilities from 0 to 10. Scores above 9 are critical, 7-8.9 are high, 4-6.9 are medium, and below 4 are low. Teams use CVSS alongside business context to determine which vulnerabilities to fix first.

SeverityCVSS RangeTypical Response Time
Critical9.0-10.0Immediate / same day
High7.0-8.9Within 7 days
Medium4.0-6.9Within 30 days
Low0.1-3.9Next release cycle

Continuous vs Periodic Scanning

Periodic scanning — running a scan once a week or before each release — creates gaps. Continuous scanning integrates into CI/CD pipelines so every commit and every dependency update is checked. This shifts security left, catching issues when they are cheapest to fix.

Common Challenges

  • Alert fatigue from high volumes of low-severity findings
  • False positives that erode developer trust in tooling
  • Lack of ownership — no clear team responsible for remediation
  • Dependency sprawl making it hard to track transitive vulnerabilities

Vulnerability Management and Autonomous Code Governance

Autonomous code governance platforms like Hydra close the gap between detection and remediation. When a vulnerability is identified in a dependency or code pattern, Hydra can automatically open a pull request with the fix, verify it passes tests, and route it for review. This transforms vulnerability management from a backlog item into a continuous, automated workflow that keeps security debt near zero.

Frequently Asked Questions

What is the difference between vulnerability management and patch management?

Patch management is a subset focused on applying vendor-released patches. Vulnerability management is broader and includes configuration changes, code fixes, and compensating controls in addition to patches.

How often should vulnerability scans run?

In modern DevOps environments, scans should run on every commit and as part of every CI build. Scheduled full-environment scans should supplement these continuous checks, not replace them.

What is a zero-day vulnerability?

A zero-day is a vulnerability that is publicly unknown or has no patch available. These require compensating controls like WAF rules or network segmentation until a fix is released.

Who is responsible for vulnerability remediation?

In most organizations, security teams identify and prioritize vulnerabilities while engineering teams own remediation. Clear SLAs and automated tooling help bridge the gap between these teams.

Frequently Asked Questions

What is the difference between vulnerability management and patch management?

Patch management applies vendor patches; vulnerability management is broader and includes code fixes, configuration changes, and compensating controls.

How often should vulnerability scans run?

Ideally on every commit via CI integration, supplemented by scheduled full-environment scans.

What is a zero-day vulnerability?

A publicly unknown flaw with no patch. Requires compensating controls until a fix is available.

Who owns vulnerability remediation?

Security teams typically identify and prioritize; engineering teams own the fixes. Clear SLAs and automation reduce friction.

Stop flagging. Start fixing.

Hyrax reviews your pull requests, remediates issues autonomously, and closes the ticket.

Join the waitlist