CG
SkillsBuilding Vulnerability Aging and Sla Tracking
Start Free
Back to Skills Library
Vulnerability Management🟡 Intermediate

Building Vulnerability Aging and Sla Tracking

Implement a vulnerability aging dashboard and SLA tracking system to measure remediation performance against severity-based timelines and drive accountability.

5 min read3 code examples

Prerequisites

  • Vulnerability management platform with historical scan data
  • Asset inventory with criticality ratings
  • ITSM/ticketing system for remediation tracking
  • Reporting platform (Splunk, Elastic, Power BI, Grafana)
  • Stakeholder agreement on SLA timelines and escalation procedures

Building Vulnerability Aging and SLA Tracking

Overview

With over 30,000 new vulnerabilities identified in 2024 (a 17% increase from the prior year), organizations must track how long vulnerabilities remain unpatched and whether remediation occurs within defined Service Level Agreements (SLAs). Vulnerability aging measures the time between discovery and remediation, while SLA tracking enforces severity-based deadlines. Industry benchmarks indicate standard SLAs of 14 days for critical, 30 days for high, 60 days for medium, and 90 days for low vulnerabilities, though more aggressive timelines (24-48 hours for actively exploited critical CVEs) are increasingly common. This guide covers designing SLA policies, building aging dashboards, implementing automated escalations, and generating compliance metrics.

Prerequisites

  • Vulnerability management platform with historical scan data
  • Asset inventory with criticality ratings
  • ITSM/ticketing system for remediation tracking
  • Reporting platform (Splunk, Elastic, Power BI, Grafana)
  • Stakeholder agreement on SLA timelines and escalation procedures

Core Concepts

Standard Vulnerability SLA Framework

SeverityCVSS RangeStandard SLAAggressive SLACISA KEV SLA
Critical9.0-10.014 days48 hoursBOD 22-01 due date
High7.0-8.930 days7 days14 days
Medium4.0-6.960 days30 daysN/A
Low0.1-3.990 days60 daysN/A
Informational0.0Best effortBest effortN/A

Adaptive SLA Modifiers

FactorModifierRationale
Internet-facing asset-50% SLAHigher exposure risk
CISA KEV listedOverride to 48hActive exploitation confirmed
EPSS > 0.7-50% SLAHigh exploitation probability
Tier 1 (crown jewel) asset-25% SLAMaximum business impact
Compensating control in place+25% SLARisk partially mitigated
Vendor patch unavailableException with review dateCannot remediate yet

Key Performance Indicators (KPIs)

KPIFormulaTarget
Mean Time to Remediate (MTTR)Avg(remediation_date - discovery_date)< 30 days overall
SLA Compliance Rate(Vulns remediated within SLA / Total vulns) * 100>= 90%
Overdue Vulnerability CountCount where age > SLATrending downward
Vulnerability Aging DistributionCount by age bucket (0-14d, 15-30d, 31-60d, 60+d)Majority in 0-30d
Remediation VelocityVulns closed per weekTrending upward
Exception Rate(Exceptions / Total vulns) * 100< 5%

Implementation Steps

Step 1: Define SLA Policy Document

Vulnerability Remediation SLA Policy v1.0

1. Scope: All information systems and applications
2. Severity Classification: Based on CVSS v4.0/v3.1 base score
3. SLA Timelines: See Standard SLA Framework table
4. Adaptive Modifiers: Applied based on asset context
5. Exception Process:
   - Must be documented with business justification
   - Requires compensating control description
   - Maximum extension: 90 days (one renewal)
   - CISO approval required for Critical/High exceptions
6. Escalation Path:
   - 50% SLA elapsed: Automated reminder to asset owner
   - 75% SLA elapsed: Escalation to manager
   - 100% SLA elapsed (overdue): CISO notification
   - 120% SLA elapsed: VP/CTO escalation
7. Metrics Reporting: Monthly to security committee

Step 2: Build the Aging Calculation Engine

import pandas as pd
from datetime import datetime, timedelta

class VulnerabilityAgingTracker:
    """Track vulnerability aging and SLA compliance."""

    SLA_DAYS = {
        "Critical": 14,
        "High": 30,
        "Medium": 60,
        "Low": 90,
    }

    def __init__(self, sla_overrides=None):
        if sla_overrides:
            self.SLA_DAYS.update(sla_overrides)

    def calculate_aging(self, vulns_df):
        """Calculate aging metrics for each vulnerability."""
        today = datetime.now()

        vulns_df["discovery_date"] = pd.to_datetime(vulns_df["discovery_date"])
        vulns_df["remediation_date"] = pd.to_datetime(
            vulns_df["remediation_date"], errors="coerce"
        )

        vulns_df["age_days"] = vulns_df.apply(
            lambda row: (row["remediation_date"] - row["discovery_date"]).days
            if pd.notna(row["remediation_date"])
            else (today - row["discovery_date"]).days,
            axis=1
        )

        vulns_df["sla_days"] = vulns_df["severity"].map(self.SLA_DAYS)
        vulns_df["sla_deadline"] = vulns_df["discovery_date"] + \
            pd.to_timedelta(vulns_df["sla_days"], unit="D")

        vulns_df["is_overdue"] = vulns_df.apply(
            lambda row: row["age_days"] > row["sla_days"]
            if pd.isna(row["remediation_date"]) else False,
            axis=1
        )

        vulns_df["sla_compliance"] = vulns_df.apply(
            lambda row: row["age_days"] <= row["sla_days"]
            if pd.notna(row["remediation_date"]) else None,
            axis=1
        )

        vulns_df["days_overdue"] = vulns_df.apply(
            lambda row: max(0, row["age_days"] - row["sla_days"])
            if row["is_overdue"] else 0,
            axis=1
        )

        vulns_df["sla_pct_elapsed"] = (
            vulns_df["age_days"] / vulns_df["sla_days"] * 100
        ).round(1)

        return vulns_df

    def generate_kpis(self, vulns_df):
        """Generate KPI summary from aging data."""
        open_vulns = vulns_df[vulns_df["remediation_date"].isna()]
        closed_vulns = vulns_df[vulns_df["remediation_date"].notna()]

        kpis = {
            "total_vulnerabilities": len(vulns_df),
            "open_vulnerabilities": len(open_vulns),
            "closed_vulnerabilities": len(closed_vulns),
            "overdue_count": open_vulns["is_overdue"].sum(),
            "mttr_days": closed_vulns["age_days"].mean() if len(closed_vulns) > 0 else 0,
            "sla_compliance_rate": (
                closed_vulns["sla_compliance"].mean() * 100
                if len(closed_vulns) > 0 else 0
            ),
        }

        kpis["overdue_by_severity"] = (
            open_vulns[open_vulns["is_overdue"]]
            .groupby("severity")
            .size()
            .to_dict()
        )

        return kpis

    def get_escalation_list(self, vulns_df):
        """Get vulnerabilities requiring escalation."""
        open_vulns = vulns_df[vulns_df["remediation_date"].isna()].copy()

        escalations = []
        for _, vuln in open_vulns.iterrows():
            pct = vuln["sla_pct_elapsed"]
            if pct >= 120:
                level = "VP/CTO Escalation"
            elif pct >= 100:
                level = "CISO Notification"
            elif pct >= 75:
                level = "Manager Escalation"
            elif pct >= 50:
                level = "Owner Reminder"
            else:
                continue

            escalations.append({
                "cve_id": vuln.get("cve_id", ""),
                "severity": vuln["severity"],
                "age_days": vuln["age_days"],
                "sla_days": vuln["sla_days"],
                "days_overdue": vuln["days_overdue"],
                "sla_pct": pct,
                "escalation_level": level,
                "asset": vuln.get("asset", ""),
                "owner": vuln.get("owner", ""),
            })

        return pd.DataFrame(escalations)

Step 3: Dashboard Visualization

# Grafana/Kibana query examples for vulnerability aging

# Age distribution histogram (Elasticsearch)
age_distribution_query = {
    "aggs": {
        "age_buckets": {
            "range": {
                "field": "age_days",
                "ranges": [
                    {"key": "0-7 days", "to": 8},
                    {"key": "8-14 days", "from": 8, "to": 15},
                    {"key": "15-30 days", "from": 15, "to": 31},
                    {"key": "31-60 days", "from": 31, "to": 61},
                    {"key": "61-90 days", "from": 61, "to": 91},
                    {"key": "90+ days", "from": 91},
                ]
            }
        }
    }
}

# SLA compliance trend (monthly)
sla_trend_query = {
    "aggs": {
        "monthly": {
            "date_histogram": {"field": "remediation_date", "interval": "month"},
            "aggs": {
                "within_sla": {
                    "filter": {"script": {
                        "source": "doc['age_days'].value <= doc['sla_days'].value"
                    }}
                }
            }
        }
    }
}

Best Practices

  1. Start with achievable SLA targets and tighten them as processes mature
  2. Adapt SLAs based on asset criticality and threat context, not just CVSS scores
  3. Automate escalation notifications to reduce manual tracking overhead
  4. Track MTTR trends month-over-month to demonstrate improvement
  5. Build exception workflows that require documented compensating controls
  6. Report SLA compliance to executive leadership monthly for accountability
  7. Include aging metrics in security committee and board-level reporting
  8. Integrate SLA tracking with ITSM ticketing for end-to-end remediation visibility

Common Pitfalls

  • Setting unrealistic SLA targets that teams cannot meet, causing SLA fatigue
  • Not adapting SLAs for asset criticality, treating all systems equally
  • Lacking exception processes, forcing teams to either ignore SLAs or request blanket waivers
  • Measuring only open vulnerability count without considering age and SLA compliance
  • Not tracking the SLA clock from discovery date (using report date instead)
  • Failing to re-baseline SLAs as team maturity improves

Related Skills

  • implementing-vulnerability-remediation-sla
  • building-executive-vulnerability-risk-report
  • implementing-security-metrics-and-kpis
  • performing-remediation-validation-scanning

Verification Criteria

Confirm successful execution by validating:

  • [ ] All prerequisite tools and access requirements are satisfied
  • [ ] Each workflow step completed without errors
  • [ ] Output matches expected format and contains expected data
  • [ ] No security warnings or misconfigurations detected
  • [ ] Results are documented and evidence is preserved for audit

Compliance Framework Mapping

This skill supports compliance evidence collection across multiple frameworks:

  • SOC 2: CC7.1 (Monitoring), CC8.1 (Change Management)
  • ISO 27001: A.12.6 (Technical Vulnerability Management)
  • NIST 800-53: RA-5 (Vulnerability Scanning), SI-2 (Flaw Remediation), CM-6 (Configuration Settings)
  • NIST CSF: ID.RA (Risk Assessment), PR.IP (Information Protection)

Claw GRC Tip: When this skill is executed by a registered agent, compliance evidence is automatically captured and mapped to the relevant controls in your active frameworks.

Deploying This Skill with Claw GRC

Agent Execution

Register this skill with your Claw GRC agent for automated execution:

# Install via CLI
npx claw-grc skills add building-vulnerability-aging-and-sla-tracking

# Or load dynamically via MCP
grc.load_skill("building-vulnerability-aging-and-sla-tracking")

Audit Trail Integration

When executed through Claw GRC, every step of this skill generates tamper-evident audit records:

  • SHA-256 chain hashing ensures no step can be modified after execution
  • Evidence artifacts (configs, scan results, logs) are automatically attached to relevant controls
  • Trust score impact — successful execution increases your agent's trust score

Continuous Compliance

Schedule this skill for recurring execution to maintain continuous compliance posture. Claw GRC monitors for drift and alerts when re-execution is needed.

Use with Claw GRC Agents

This skill is fully compatible with Claw GRC's autonomous agent system. Deploy it to any registered agent via MCP, and every execution will be logged in the tamper-evident audit trail.

// Load this skill in your agent
npx claw-grc skills add building-vulnerability-aging-and-sla-tracking
// Or via MCP
grc.load_skill("building-vulnerability-aging-and-sla-tracking")

Tags

vulnerability-managementsla-trackingremediation-metricsaging-reportkpicompliancerisk-management

Related Skills

Vulnerability Management

Implementing Vulnerability Management with Greenbone

3m·intermediate
Vulnerability Management

Implementing Vulnerability Sla Breach Alerting

4m·intermediate
Vulnerability Management

Building Vulnerability Dashboard with DefectDojo

3m·intermediate
Vulnerability Management

Building Vulnerability Exception Tracking System

3m·intermediate
Vulnerability Management

Implementing Patch Management Workflow

5m·intermediate
Vulnerability Management

Performing Asset Criticality Scoring for Vulns

3m·intermediate

Skill Details

Domain
Vulnerability Management
Difficulty
intermediate
Read Time
5 min
Code Examples
3

On This Page

OverviewPrerequisitesCore ConceptsImplementation StepsBest PracticesCommon PitfallsRelated SkillsVerification CriteriaCompliance Framework MappingDeploying This Skill with Claw GRC

Deploy This Skill

Add this skill to your Claw GRC agent and start automating.

Get Started Free →