Use CVSS (v3.1) scores, exploitability, business impact, and threat intelligence to prioritise.
Integrate with a Risk Register (mapped to FCA expectationsarrow-up-right).
High-risk vulnerabilities: mitigation initiated within 24–72 hours.
References:
SP 800-30r1 https://csrc.nist.gov/pubs/sp/800/30/r1/finalarrow-up-right
CVSS (v3.1) https://nvd.nist.gov/vuln-metrics/cvss/v3-calculatorarrow-up-right
Financial Conduct Authority handbook on risk control https://www.handbook.fca.org.uk/handbook/SYSC/7/1.htmlarrow-up-right
Last updated 7 months ago