3.11.3 — Fix What You Find
What It Says
Section titled “What It Says”Remediate vulnerabilities in accordance with risk assessments.
What It Actually Means
Section titled “What It Actually Means”Scan results without remediation are useless. Two things: vulnerabilities are identified (from scans, assessments, advisories) and they’re remediated in accordance with risk — highest risk first. Define remediation SLAs by severity: critical within 48-72 hours, high within 14-30 days, medium within 90 days, low in the next maintenance window. Track every vulnerability from identification through closure. The assessor will compare sequential scan results — if the same critical vulnerability appears in consecutive scans, that’s a finding.
Pass or Fail
Section titled “Pass or Fail”Your assessor needs a “yes” to every row:
| # | Question | What “yes” looks like |
|---|---|---|
| 1 | Are vulnerabilities identified? | Vulnerability scan results triaged and documented |
| 2 | Are vulnerabilities remediated by risk priority? | Remediation records showing SLA adherence; sequential scans showing closure |
What to Have Ready on Assessment Day
Section titled “What to Have Ready on Assessment Day”Documents they’ll review: Risk assessment policy; vulnerability scan results (sequential); remediation records and SLA tracking; POA&M; patch management records; system security plan
People they’ll talk to: Personnel with risk assessment and vulnerability management responsibilities; information security personnel
Live demos they’ll ask for: “Show me your remediation SLAs by severity.” “Pick a critical finding — when found vs. when fixed.” “Show me sequential scans proving closure.” “How do you track remediation?”
The Assessor’s Playbook
Section titled “The Assessor’s Playbook”These are the actual questions. Have answers ready.
- “Show me how you prioritize vulnerability remediation.”
- “What are your remediation SLAs by severity?”
- “Show me a critical finding — when was it found and when was it fixed?”
- “Are risk assessment results used to prioritize?”
- “Show me sequential scan results — are findings being closed?”
Where Companies Trip Up
Section titled “Where Companies Trip Up”Scans without remediation. Reports pile up, nothing gets patched. Assign every finding a ticket with an owner and deadline.
No prioritization. Everything treated equally. Critical vulnerabilities sit alongside cosmetic findings. Use risk-based SLAs.
No tracking. Vulnerabilities fixed but not tracked to closure. Sequential scans should show decreasing vulnerability counts.
How to Talk About This
Section titled “How to Talk About This”Connected Requirements
Section titled “Connected Requirements”| Requirement | Why it matters here |
|---|---|
| 3.11.2 — Scan for Vulnerabilities | Scanning identifies the vulnerabilities this requirement remediates |
| 3.14.1 — Patch Your Systems | Patching is the primary remediation method |
| 3.12.2 — Track Every Gap | POA&M tracks items needing extended remediation |
Implementation
Section titled “Implementation”Step-by-step guides for Microsoft 365, AWS, Azure, and GCP are available to Ancitus clients.
Start a conversation →CMMC Practice ID: RA.L2-3.11.3 | SPRS Weight: 1 point | POA&M Eligible: Yes