The Vulnerabilities section of the Assets module tracks security vulnerabilities discovered across your asset inventory. Vulnerabilities are imported automatically from connected security tools or recorded manually, providing a unified view of your organization’s exposure.

Vulnerability Sources

Vulnerabilities enter LowerPlane through connected security tool integrations:
IntegrationVulnerability Types
SnykOpen source dependency vulnerabilities, container image issues, code security findings
WizCloud misconfiguration, workload vulnerabilities, network exposure
AWS InspectorEC2 instance and container image vulnerabilities
CrowdStrike SpotlightEndpoint vulnerability findings
Qualys Cloud PlatformNetwork and web application vulnerabilities
TenableInfrastructure vulnerability assessment findings
GitHub DependabotDependency vulnerability alerts
GitLab Vulnerability ScannerSAST, DAST, and dependency findings
SemgrepStatic analysis security issues
SonarQubeCode quality and security vulnerabilities
Connect at least one vulnerability scanner to automate this process. Manual vulnerability tracking is error-prone and difficult to maintain at scale.

Severity Levels

Every vulnerability is assigned a severity level based on the source tool’s assessment:
SeveritySLA GuidanceDescription
CriticalRemediate within 7 daysActively exploitable, high impact, or public exploit available
HighRemediate within 30 daysSignificant risk, likely exploitable
MediumRemediate within 90 daysModerate risk, requires specific conditions to exploit
LowRemediate as resources allowLow risk, limited exploitability
InformationalNo SLAAwareness only, best practice recommendations
The SLA guidance above represents common industry benchmarks. Configure your organization’s specific SLA targets in Settings to match your risk appetite and compliance requirements.

Viewing Vulnerabilities

Navigate to Assets > Vulnerabilities to see all tracked vulnerabilities. The list supports:
  • Filtering by severity, status (open, in progress, resolved, accepted), source integration, and affected asset
  • Searching by CVE ID, vulnerability title, or affected component
  • Sorting by severity, discovery date, age, or affected asset
  • Grouping by asset, severity, or source
Each vulnerability entry displays:
FieldDescription
TitleName or CVE identifier of the vulnerability
SeverityCritical, high, medium, low, or informational
Affected assetThe asset where the vulnerability was found
SourceIntegration that reported the finding
StatusOpen, in progress, resolved, or accepted risk
DiscoveredWhen the vulnerability was first detected
AgeDays since discovery (highlights SLA breaches)

Remediation Workflows

1

Triage

Review new vulnerabilities and confirm their severity. Assign an owner responsible for remediation.
2

Assess

Determine the appropriate remediation action: patch, upgrade, configuration change, compensating control, or risk acceptance.
3

Remediate

Apply the fix in the affected system. Update the vulnerability status to In Progress while work is underway.
4

Verify

On the next integration sync, LowerPlane automatically checks whether the vulnerability is still present. If resolved, the status updates to Resolved automatically.
5

Document

For accepted risks, record the justification, approval, and any compensating controls. This documentation serves as audit evidence.

Risk Acceptance

Not every vulnerability requires immediate remediation. When the risk is acceptable due to compensating controls or low business impact:
  1. Open the vulnerability detail page.
  2. Change the status to Accepted Risk.
  3. Record the justification, including who approved the acceptance and what compensating controls are in place.
  4. Set a review date to re-evaluate the acceptance.
Accepted risk vulnerabilities still appear in reports and dashboards. Auditors will review these decisions and expect documented justification. Do not use risk acceptance as a way to hide findings.

Compliance Impact

Vulnerability management is a core requirement across all supported frameworks:
FrameworkRelevant Requirements
ISO 27001A.12.6.1 (Management of technical vulnerabilities)
SOC 2CC7.1 (Monitoring infrastructure for vulnerabilities)
HIPAA164.308(a)(1) (Risk analysis), 164.308(a)(5)(ii)(B) (Protection from malicious software)
GDPRArticle 32 (Appropriate technical measures)
PCI-DSSReq 6.1 (Identify vulnerabilities), Req 11.2 (Vulnerability scans)
LowerPlane automatically runs tests that check:
  • No critical vulnerabilities older than SLA threshold — Verifies remediation is happening within defined timeframes
  • Vulnerability scanning is active — Confirms scanners are running and covering all in-scope assets
  • Vulnerability trends are improving — Tracks whether your overall vulnerability count is decreasing over time

Vulnerability Metrics

The vulnerability dashboard provides key metrics:
  • Total open vulnerabilities — Count by severity level
  • Mean time to remediation — Average days from discovery to resolution
  • SLA compliance — Percentage of vulnerabilities resolved within SLA
  • Aging analysis — Breakdown of open vulnerabilities by age
  • Trend over time — Historical view of vulnerability counts
Auditors frequently request vulnerability metrics as part of their evidence review. LowerPlane generates these reports automatically, so they are always current when you need them.

Best Practices

  • Scan continuously, not periodically. Connect scanners that run regularly rather than relying on quarterly assessments.
  • Set realistic SLAs. SLAs that are too aggressive lead to risk acceptance overuse. SLAs that are too lenient leave you exposed.
  • Track all vulnerabilities, not just critical. Auditors look at your full vulnerability management process, not just critical findings.
  • Review accepted risks quarterly. Conditions change. A risk that was acceptable six months ago may no longer be.
  • Use vulnerability data in risk assessments. Feed vulnerability trends into your risk register to maintain an accurate risk picture.