Application Vulnerability Remediation Process

Our software remediation process focuses on maintaining an accurate time, scope, and cost while identifying, communicating, and mitigating risks.

Once you have told us the purpose of your project and we both agree that our services align with your needs and wish to move forward, we then start the project’s Initiating stage below.

Initiating – In this consultation, we give a candid and objective assessment of your remediation project. After this phase is completed, we should have the information that is required for a project charter. This should include a high-level understanding of the known constraints and assumptions, preliminary project milestones, a budget, and possibly a cost estimate range based on a top-down understanding of the project.

Planning – At this next stage, we will need to obtain more information to build on the findings from the Initiating consultation by estimating a more accurate time, scope, and cost. This will require identifying vulnerability risks and their associated business risks (if applicable) as well as project risks/difficulties and mitigation of all of these risk types.

Executing - After the project's scope, schedule, and cost has been determined, we can go through the following steps to finalize the process of fixing, testing, and deploying the vulnerability fixes to your production environment.

Controlling – As we progress in the project, we will communicate the status of our work items (as stated in the Planning-Communication section above) and collaborate with you to monitor the current scope and milestones.

Deep analysis may uncover hidden complexities, additional vulnerabilities, or require a need to apply risk contingencies as the project progresses. Scope creep can happen in these instances, but using your change-control process, continuously monitoring vulnerability and project risk for adjustments, and then fixing the most critical vulnerabilities that are the quickest to solve is a good way to reduce this.

Closing – Once the project has come to an end, we will work with you to initiate the process of administrative closure of the project where we make sure that you have final deliverables (eg. extra information that we learned about your build environment, architecture, and application’s vulnerabilities) and perform a post-implementation review where we will determine the project’s success, lessons learned, risk assessment of any outstanding vulnerabilities that might remain, and then present an alignment to our sustainment services if applicable.

Sustaining – You can count on us to maintain the security of your application whether it is via application security development in your team in a continuous integration environment, periodically reviewing code and/or running a static analysis and fixing new vulnerabilities, or performing other variations of application vulnerability remediation to fit your needs. We are here to solve these problems in a consistent and reliable way.