/
Vulnerability Exemption Process

Vulnerability Exemption Process

If a finding can not be addressed it has to fit one of the following exceptions outlined below. These requests have to be submitted by the Application Owner or Systems with a valid reason on why the finding can not be addressed. 

Business Requirement

If the resolution of the vulnerability finding could provide a negative impact to the application of the system this would classify as an exemption. These exemptions do have an expiration date based on the timeframe of the fix. 

False Positive 

If a vulnerability is discovered and an application owner or system team discovers a false positive this would qualify for an exemption. Security does take a proactive approach in preventing false positives by checking the RPM (Red Hat Package Manager) and software installed using authentication. However, we are aware that no software is perfect. 



Requests will be submitted via Service Now self-service module and assigned to the Cybersecurity assignment group. 

Required Information:

  •  

    • Exemption Type: Business Requirement or False Positive

    • Asset: List Hostnames/ IP Address(es) 

    • Vulnerability: List specific vulnerability. For example: RHSA-2015:1330: python security, bug fix, and enhancement update 

    • Remediation Step: Upgrade python

  • Exemption Justification: Upgrading to the latest version of python would break a production application 

  • Timeframe: It will require 6 months of effort to rewrite the code and to the latest version of python (needed if exemption type is a business requirement)

  • False Positive Notes: Nexpose is reporting on the kernel incorrectly. Vulnerability impacts version Y and the installed version is X.  (needed if exemption type is a false positive)

Related content

Exception Request Process
Exception Request Process
More like this
Linux Vulnerabilities
Linux Vulnerabilities
More like this
A Vulnerability Assessment Solution Should be Enabled on your Virtual <achines
A Vulnerability Assessment Solution Should be Enabled on your Virtual <achines
More like this
Knowledge Base Articles
Knowledge Base Articles
More like this
Columbia University Vulnerability Management
Columbia University Vulnerability Management
More like this
Windows Vulnerabilities
Windows Vulnerabilities
More like this