---
# ============================================================
# CONTROL METADATA
# ============================================================
control_id: MC-VM-M
control_name: Vulnerability Management Monthly Review
control_area: VM
frequency: M
period: 2026M04
review_date: 2026-04-07
reviewer: Senior Consultant (vCISO, Applied Risk Management)
# ============================================================
# SUB-CONTROL RESULTS
# ============================================================
sub_controls:
- id: VM-M-01
name: Scan coverage and data integrity
result: PASS
criteria:
- id: VM-M-01.1
description: All in-scope assets scanned within review period
result: PASS
evidence: Qualys reports 142 of 142 assets scanned. No failures.
- id: VM-M-03
name: Remediation SLA tracking
result: FAIL
criteria:
- id: VM-M-03.1
description: 90% of critical vulnerabilities remediated within 90 days
result: FAIL
target_pct: 90
actual_pct: 58
evidence: 31 of 74 active critical vulnerabilities (42%) exceed 90 days. Concentration on SVR-PROD-DB-04, LAP-FIN-08, and the FortiGate perimeter pair.
# ============================================================
# COMPLIANCE SUMMARY
# ============================================================
compliance:
total_sub_controls: 8
passed: 6
failed: 2
rate_pct: 75.0
trend_vs_previous: improving
---
# Monthly Vulnerability Management Review
Control: MC-VM-M · Period: 2026M04 (April 2026) · Reviewer: Senior Consultant, vCISO
Executive summary
Acme Pharma's enterprise TruRisk score improved to Low (412) following remediation of the March MS Exchange cluster. Total active critical vulnerability inventory (QDS > 89) is 74 across the 142-asset estate.
Compliance: 6 of 8 sub-controls passed (75.0%), up from 62.5% in March. The two failing sub-controls (VM-M-03 SLA tracking, VM-M-05 persistent vulnerability escalation) map to the same underlying issue: a small number of database servers and finance laptops carry the bulk of the aged critical inventory.
Sub-control results
| Sub-control | Result | Criteria passed |
| VM-M-01 Scan coverage and data integrity | PASS | 2 of 2 |
| VM-M-02 Critical and high vulnerability triage | PASS | 2 of 2 |
| VM-M-03 Remediation SLA tracking | FAIL | 1 of 2 |
| VM-M-04 CISA KEV and ransomware prioritisation | PASS | 3 of 3 |
| VM-M-05 Persistent vulnerability escalation | FAIL | 0 of 2 |
| VM-M-06 Action tracking and closure | PASS | 2 of 2 |
| VM-M-07 Newly detected vulnerability triage | PASS | 1 of 1 |
| VM-M-08 Asset-level hotspot review | PASS | 1 of 1 |
Persistent vulnerability escalation (VM-M-05)
| Item | Age | Comment |
| SVR-PROD-DB-04: PostgreSQL CVE-2025-1094 | 168 days | CISA KEV. Argyle MSP closure plan overdue. RAC escalation triggered. |
| FW-DUB-01 / FW-DUB-02: FortiOS 7.0.x EOL | 422 days | Perimeter pair on EOL firmware. Replacement project requires capex approval. |
| LAP-FIN-08 (M. Devlin): Office cluster | multi-month | 9 active critical, 247 total. Fourth consecutive review on this device. |
Auditor notes
- The SLA failure in VM-M-03 is the strategic concern. The hotspot pattern indicates targeted intervention on three assets would substantially improve the metric.
- SVR-PROD-DB-04 at 168 days is now the longest-running open critical in the estate. Two-week deadline set on Argyle MSP before RAC routing.
- FortiGate perimeter pair on EOL firmware is a strategic exposure; the action this month is to formalise the replacement timeline at the May management meeting, not patch the unpatchable.
- The Acme Commercial-team phishing-simulation cluster (cross-referenced from MC-SAT-M) suggests targeted re-training rather than another all-staff campaign.