Skip to content

Escalation Processes

Standard remediation and escalation procedures

As soon as we discover a vulnerability, the Vulnerability Management team will look to escalate to the correct team or individual. The process and individuals that are contacted will depend on the risk level of the vulnerability.

Critical vulnerabilities

  • immediate notification: we’ll notify the Security Incident Management team or senior management of critical vulnerabilities that have surfaced
  • rapid containment: we’ll suggest temporary measures to mitigate the risk (for example, disabling affected services, applying workarounds)
  • root cause analysis: we’ll initiate a thorough investigation to determine the cause of the vulnerability, and record the investigation in a report
  • remediation: we’ll develop a remediation plan with the service maintainers/owners to address the vulnerability permanently, and track the vulnerabilities in DfE's vulnerability management reporting.

High vulnerabilities

  • Prioritised response: we’ll escalate to the appropriate engineering team
  • Risk assessment: we’ll evaluate the potential impact and likelihood of exploitation in a risk assessment, and share with maintainers, owners and stakeholders
  • Remediation planning: we’ll develop a remediation plan with the service owners and development team to address the vulnerability permanently, and track the vulnerabilities in DfE's vulnerability management reporting

Medium and low vulnerabilities

  • Prioritised response: we’ll advise maintainers and owners on how to address vulnerabilities based on their risk level and available resources
  • Remediation planning: we’ll include these vulnerabilities in DfE's vulnerability management program reporting

Urgent vulnerability escalation procedures

If the standard procedures we follow are not effective we will follow vulnerability escalation procedures to ensure that the issues are fixed in good time.

Reporting

All vulnerabilities are reported in central dashboards, categorised by service. These will be reported directly to the Deputy Director responsible for the service by the Cyber and Information Security Officer (CISO).

We currently collect data on open vulnerabilities for SAST (Static Analysis Security Testing), SCA (Software Composition Analysis), Qualys infrastructure scans (Azure Virtual Machines), and vulnerabilities reported through the Vulnerability Disclosure Programme (VDP).

Escalation steps

If the standard remediation and escalation procedures are followed and vulnerabilities fail to be fixed within reasonable timeframes, the issue will be escalated according to the table below.

Risk level # days since discovered Action
Critical 10 Vulnerability Management (VM) Lead reports issue to Service Owner and delivery team to discuss immediate remediation. A ticket is raised in ServiceNow and a message is sent in Teams or Slack to the Service Owner.
Critical 20 VM Lead and Cyber and Information Security Division (CISD) Head of Cyber Operations (G6) will raise any progress issues with the Service Owner and their management/SMT (G6). A Teams call will be organised including all involved to discuss remediation and a follow up email with actions and discussion points are sent to attendees.
Critical 30 The CISO will be notified of failure to fix and will raise a concern with the relevant Deputy Director (DD). The issue is raised in a formal email and discussion, all details are provided and the CISO will engage with the DD.
High 20 VM Lead reports issue to Service Owner and delivery team to discuss immediate remediation. A ticket is raised in ServiceNow and a message is sent in Teams or Slack.
High 30 VM Lead and Cyber and Information Security Division (CISD) SMT (G6) will raise any progress issues with the Service Owner and their management/SMT (G6). A Teams call will be organised including all involved to discuss remediation and a follow up email with actions and discussion points are sent to attendees.
High 60 The CISO will be notified of failure to fix and will raise a concern with the DD. The issue is raised in a formal email and discussion, all details are provided and the CISO will engage with the DD.

Tracking

While the continuous assurance platform has been designed to track misconfigurations and vulnerabilities in our stack, there is still a need to track vulnerabilities that have been triaged to ensure there is visibility over the time it takes to fix a vulnerability, reasons why vulnerabilities are not being fixed within a reasonable time and the effectiveness of the escalation process. In this case, the Vulnerability Management team will track their work in Azure DevOps for each vulnerability triaged to a team.