Tega Ewubare

Vulnerability Management Program Implementation

In this project, we simulate the implementation of a comprehensive vulnerability management program, from inception to completion.
This includes workflow from the ground up, highlighting both technical implementation and cross-team coordination.

Inception State: No policy or processes exist.
Completion State: Policy is approved, buy-in is achieved, and vulnerabilities are remediated.


Platforms and Technology Used


πŸ“‹ Table of Contents


🧾 Policy Draft Creation

Before any technical work began, a formal policy was drafted outlining:

This foundational document ensures all teams are aligned on expectations and procedures.


Slack Conversation: Stakeholder Buy-In

Introduced the draft policy to John at the Server Team, received feedback on remediation timelines, and agreed on a 1-week window for critical issues.

Slack Conversation - Part 1
Slack Conversation - Part 2


Policy Finalization and Sign-Off

Final edits were made based on team feedback. Policy was approved by senior leadership and now serves as the formal governance document.
View Final Policy


Slack Conversation: Initial Scan Coordination

Coordinated credentialed scans with Sarah at the Server Team. Agreed to begin with a pilot server and use just-in-time Active Directory credentials.

Slack Conversation - Part 1
Slack Conversation - Part 2
Slack Conversation - Part 3


Initial Scan Execution

Executed the first authenticated scan.
Scan Report (Scan 1)


Vulnerability Assessment & Prioritization

Findings were assessed based on exploitability, ease of remediation, and organizational impact:

Priority Vulnerability Type Justification
1 Outdated Wireshark Can be removed safely; known exploits
2 Deprecated protocols (TLS 1.0/1.1) Weak encryption poses enterprise risk
3 Guest account in Admin group Should not have guest accounts on these types of servers
4 Windows Updates missing Addressed by patch management tools

Remediation Distribution

Server team received remediation scripts and instructions via internal communication and began work on fixes.

Remediation Email Screenshot


Slack Conversation: Post-Scan Review

Reviewed vulnerabilities found in Scan 1. Confirmed no outages. Planned fixes for insecure software, protocols, and user accounts.

Slack Conversation – Post-Scan Review


Slack Conversation: Change Advisory Board Meeting

Approved remediation packages. Discussed rollback strategies and pilot rollout for protocol and cipher updates.

Slack Conversation – CAB Part 1
Slack Conversation – CAB Part 2


Remediation Rounds

Round 1: Wireshark Removal

Script – Wireshark Uninstall
Scan Report (Scan 2)


Round 2: Insecure Protocols & Ciphers

Script - Protocols
Script - Ciphers
Scan Report (Scan 3)


Round 3: Guest Account Removal

Script – Remove Guest from Local Admins
Scan Report (Scan 4)


Round 4: Windows Updates

Windows patching enabled and completed.
Scan Report (Scan 5)


Remediation Summary

Before Remediation – Scan 1 (June 30, 2025)
Total Vulnerabilities: 29

After Remediation – Scan 5 (July 1, 2025)
Total Vulnerabilities: 6

Reduction Achieved:

Line graph showing vulnerability reduction across five scan rounds


Remaining Vulnerabilities (Post-Scan 5)

Despite significant remediation progress, the following 6 vulnerabilities remain:

Severity Plugin ID Vulnerability Name
High 166555 WinVerifyTrust Signature Validation CVE-2013-3900 Mitigation
Medium 132101 Windows Speculative Execution Configuration Check
Medium 57608 SMB Signing Not Required
Medium 57582 SSL Self-Signed Certificate
Medium 51192 SSL Certificate Cannot Be Trusted
Low 10114 ICMP Timestamp Request Remote Date Disclosure

Planned Actions:

These issues are tracked in the remediation backlog and scheduled for resolution in the next maintenance cycle.


Ongoing Maintenance

A quarterly scan routine has been established.
New vulnerabilities will follow the same workflow: scan, assess, approve, and remediate based on policy SLAs.
Backlog items will be reviewed and prioritized in weekly operations review cycles.