• Home
  • >
  • DevOps News
  • >
  • Vulnerability Management Could Use Some Validation – InApps Technology 2025

Vulnerability Management Could Use Some Validation – InApps Technology is an article under the topic Devops Many of you are most interested in today !! Today, let’s InApps.net learn Vulnerability Management Could Use Some Validation – InApps Technology in today’s post !

Key Summary

This InApps.net article, published in 2022 and authored by Tal Klein, CMO at Rezilion, addresses inefficiencies in vulnerability management within DevOps. Written with a critical, solution-oriented tone, it aligns with InApps Technology’s mission to cover DevOps and software development trends, offering practical insights into optimizing vulnerability remediation.

Key Points:

  • Context: Vulnerability management in DevOps is hindered by slow remediation (38–150 days MTTP) and treating all vulnerabilities as critical, creating inefficiencies across the CI/CD pipeline.
  • Core Insight: Vulnerability validation, which identifies exploitable threats, can reduce remediation workload by up to 75%, focusing efforts on actual risks and minimizing “patch debt.”
  • Key Features:
    • Vulnerability Overload: Traditional scanners flag all vulnerabilities, but research shows 67–75% of high-severity issues in top DockerHub containers are never loaded into memory, posing no threat.
    • Impact on DevOps: Unvalidated vulnerabilities increase risk debt, slow deployments, and force trade-offs between security and feature development.
    • Validation Benefits: Prioritizing exploitable vulnerabilities reduces attack surfaces, lowers MTTP, and accelerates DevOps workflows by avoiding unnecessary patches.
  • Outcome: Adopting vulnerability validation streamlines remediation, enhances security focus, and boosts DevOps efficiency, allowing teams to deploy faster with reduced risk.

This article reflects InApps.net’s focus on innovative DevOps and software development, providing an inclusive, practical overview of improving vulnerability management through validation.

Read more about Vulnerability Management Could Use Some Validation – InApps Technology at Wikipedia

You can find content about Vulnerability Management Could Use Some Validation – InApps Technology from the Wikipedia website

Read More:   Minimize Downtime in Production with Cloud-Based Distributed Load Testing – InApps 2025

Rezilion sponsored this post.

Tal Klein

Tal is CMO at Rezilion, the industry-leading autonomous cloud workload protection platform. He has more than 20 years of experience in the IT and information security industry — working with leaders and exciting emerging vendors in cloud security, client virtualization and networking and data communications.

The “pets vs. cattle” metaphor in DevOps could be accused of having jumped the shark, but in the world of vulnerability management, every vulnerability is still a pet. While every company has their own metrics for MTTP (Mean Time To Patch), industry consensus is that it takes at least 38 days to patch a vulnerability — and possibly as long as 150 days. To figure out your MTTP, multiply the number of vulnerabilities found during your last scan by however many business days it takes your team, on average, to remediate a single vulnerability.

Inertia is the enemy of DevOps. The vulnerability dilemma creates problems on both the left and right sides of the CI/CD spectrum. On the right, time spent remediating vulnerabilities either forces services and applications to be decommissioned or creates windows of opportunity for attackers. On the left, vulnerabilities create risk debt and force developers to choose between features and security.

Vulnerability Anxiety Is Real

Each vulnerability that your scanner finds generates work. First, what is the risk associated with the vulnerability? We already know that CVSS scores don’t tell the full story, because attack chains often begin with lower-scoring vulnerabilities that are easier to exploit. Is the vulnerability in a mission-critical service? Is it in a VM, a container, or in code? We then have to figure out who to assign it to. That person has to figure out if there’s a patch yet; and if so, what’s the performance impact of the patch? Will patching one thing break something else in production? And that’s just the beginning.

Read More:   3 Digital Transformation Roadblocks — And How to Get Around Them – InApps Technology 2022

So, we live in a world where security and DevOps are inundated with more vulnerabilities than they have the time or resources to patch. Vulnerability Prioritization solutions bring analytics and vulnerability intelligence to reduce the resource requirements of performing vulnerability management. There are good prioritization tools out there that help identify which vulnerabilities are actively exploited in the wild and which ones have been patched successfully without performance impact. Some solutions even have predictive modeling, to predict which vulnerabilities are more likely to be weaponized and should be remediated on priority.

Prioritization is very useful as a triage mechanism, but even the lowest-ranked vulnerability eventually has to be dealt with, right? For example, a vulnerability with a low CVSS score that isn’t actively being exploited in the wild still needs to be remediated at some point; because if there’s a CVE, someone’s going to exploit it. That vulnerability might be on the lowest rung of the triage ladder, but someone will eventually need to deal with it — it’s remediation debt. Or is it?

It Doesn’t Matter if a Vulnerability That’s Not in Runtime Is Exploited in the Wild

Think about it: If there’s an FPGA driver in your Kubernetes container and that driver has a vulnerability with a CVSS score of 9, which is actively being exploited in the wild, a vulnerability prioritization mechanism may triage it as a high priority. But then you dig in and find that there are no FPGAs in your environment, so that driver will never be loaded into memory and thus does not represent a threat. Whereas if you have an NGINX vulnerability with a CVSS score of 2 that isn’t exploited in the wild but is loaded into memory, then wouldn’t you agree that it represents a much bigger risk than the FPGA vulnerability?

Before we triage vulnerabilities, doesn’t it make sense to figure out if those vulnerabilities are actually relevant to our specific environment?

Read More:   Update Qumulo Scales Distributed Storage for Collaborative Online Video Editing

https://www.youtube.com/watch?v=xTI6eXZcGTs

Rather than prioritize based on objective risk, the ability to filter based on actual, contextual risk would seem like a necessary first step in the prioritization workflow. Before prioritizing which vulnerabilities need to be mitigated, let’s filter out all the vulnerabilities that will never be exploited — and then sort them in order of risk.

One Question: Does This Vulnerability Exist in Runtime or Not? 

Sometimes adding a cog can optimize the entire assembly line. By inserting a validation step into your vulnerability handling workflow, you could cut down the amount of remediation work your team needs to do — while concurrently reducing your attack surface. This one step could streamline your remediation efforts, by focusing your team’s efforts on vulnerabilities that represent actual (rather than perceived) risk.

How can we quantify this optimization? You may already be familiar with research we’ve conducted proving that 67% of the vulnerabilities with “high severity” scores in the top 20 containers in DockerHub are never loaded into memory. Among our customers, we’ve seen that number rise as high as 75%. Think about it, 75% of the vulnerabilities identified by your vulnerability scanner may be utterly benign and pose zero threat. If one were prioritizing vulnerability management based on attacks in the wild and CVSS scores, they would run the risk of spending upward of 70% of their time and effort on vulnerabilities that posed no risk to their production environment.

Wouldn’t it be great if, before you started assigning vulnerability prioritization and remediation work, you know which vulnerabilities actually represent a threat to your apps and services? How would that affect your MTTP? And, equally important, how much faster would your DevOps teams be able to deploy if vulnerabilities didn’t constantly fail their builds? You’ve got tools that automate vulnerability scanning and prioritization but, if that automation isn’t saving you from “patch debt,” maybe it’s time to invest in vulnerability validation.

Feature image via Pixabay.

InApps Technology is a wholly owned subsidiary of Insight Partners, an investor in the following companies mentioned in this article: Real.

Source: InApps.net

Rate this post
As a Senior Tech Enthusiast, I bring a decade of experience to the realm of tech writing, blending deep industry knowledge with a passion for storytelling. With expertise in software development to emerging tech trends like AI and IoT—my articles not only inform but also inspire. My journey in tech writing has been marked by a commitment to accuracy, clarity, and engaging storytelling, making me a trusted voice in the tech community.

Let’s create the next big thing together!

Coming together is a beginning. Keeping together is progress. Working together is success.

Let’s talk

Get a custom Proposal

Please fill in your information and your need to get a suitable solution.

    You need to enter your email to download

      Success. Downloading...