Is Vulnerability Management Dead? A Security Architect's Survival Guide
This talk examines the limitations of traditional vulnerability management, specifically the reliance on CVSS scores and the disconnect between vulnerability discovery and remediation. It highlights the critical role of context, such as reachability and business criticality, in prioritizing risks effectively. The speaker advocates for a shift towards risk-based remediation, leveraging infrastructure-as-code (IaC) correlations and cloud guardrails to reduce exploitability. The presentation concludes with a framework for integrating AI to automate triage and decision-making in complex cloud environments.
Why Your Vulnerability Management Program is Just Expensive Noise
TLDR: Traditional vulnerability management programs are failing because they prioritize raw CVSS scores over actual exploitability and business context. Most organizations are drowning in a backlog of thousands of "critical" issues that are either unpatchable or irrelevant to their specific environment. By shifting focus toward reachability analysis, infrastructure-as-code (IaC) drift, and automated guardrails, security teams can finally move from endless ticket-churning to meaningful risk reduction.
Vulnerability management is broken. If you have spent any time in a security operations center or running a red team engagement, you know the drill. You scan a fleet, the scanner spits out a list of ten thousand vulnerabilities, and the team spends the next month arguing over which ones to patch first. We have been conditioned to treat a CVSS 9.8 as a fire drill, regardless of whether the affected service is a public-facing web server or a sandboxed internal microservice with no network path to the internet.
The reality is that most of these "critical" vulnerabilities are never going to be exploited in your specific environment. When you look at the data, the vast majority of security incidents are not caused by some zero-day exploit against a patched system. They are caused by backlogged, known risks that the security team was already aware of but failed to prioritize correctly. We are treating the symptoms while ignoring the underlying disease: a lack of context.
The Failure of Static Prioritization
The industry obsession with CVSS scores is a trap. A score measures the severity of a vulnerability in a vacuum, but it tells you nothing about the risk to your organization. If you are a pentester, you know that the first thing you do after getting a shell is check for reachability. Can I talk to this service? Does it have an IAM role attached? Is it exposed to the internet? If the answer is no, that "critical" vulnerability is just noise.
Research shows that exploitation of vulnerabilities is increasingly suppressing traditional phishing as an initial access vector. Attackers are not waiting for you to patch. They are scanning for misconfigurations and exposed services that provide an immediate, reliable path into your cloud environment. If your vulnerability management program does not account for reachability, you are essentially leaving your front door wide open while you spend all your time reinforcing the windows in the basement.
Moving Beyond the Ticket Queue
Fixing this requires a fundamental change in how we handle remediation. Instead of treating every finding as a ticket that must be closed, we need to treat remediation as a surgical operation. This starts with building a unified data layer that correlates your vulnerability scanner output with your cloud inventory. You need to know exactly which assets are public-facing, which ones hold sensitive data, and which ones are running on outdated base images.
Infrastructure-as-code (IaC) is your best friend here. If you are using Terraform or CloudFormation, you have a blueprint of your entire environment. When a vulnerability is found, you should be able to trace it back to the specific IaC template that deployed it. This allows you to identify the "where" of the risk. If you find a misconfiguration in a Lambda function, you don't just patch the function; you update the template so the vulnerability cannot be redeployed.
The Role of Mitigating Controls
Sometimes, you simply cannot patch. You might be running a legacy application that requires a specific, vulnerable library to function, or the business might deem the risk of downtime from a patch higher than the risk of exploitation. This is where mitigating controls come in. If you cannot fix the vulnerability, you must reduce its exploitability.
This is where tools like a Web Application Firewall (WAF) or Service Control Policies (SCPs) in AWS become critical. You can often block the attack path without touching the vulnerable application itself. For example, if you have a service vulnerable to an OWASP A05:2021-Security Misconfiguration, you can often implement a WAF rule to block the specific request patterns that trigger the exploit.
Automating the Triage
Automation is not about replacing the security engineer; it is about giving them the context they need to make decisions faster. You cannot automate the entire remediation process because every environment is unique, but you can "AI-it." Use machine learning to correlate your vulnerability data with your threat intelligence feeds. If a vulnerability has no known exploit in the wild, and it is buried deep in your internal network, it should not be a priority.
The goal is to reach a state where your security team is only looking at the risks that actually matter. This means building guardrails that prevent developers from deploying insecure configurations in the first place. If you can stop a misconfigured S3 bucket from being created via a CI/CD pipeline check, you have saved yourself a week of incident response.
Stop chasing every high-severity alert. Start mapping your assets, understanding your attack surface, and focusing your limited resources on the vulnerabilities that provide a clear, exploitable path for an attacker. If you are not doing that, you are not managing risk; you are just managing a spreadsheet.
Vulnerability Classes
Target Technologies
OWASP Categories
Up Next From This Conference
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Counter Deception: Defending Yourself in a World Full of Lies




