When I joined Red Hat in 2019, one of the first blogs that I read was titled “Why CVSS does not equal risk: How to think about risk in your environment”. In summary, it explains why CVSS ≠ Risk: Common Vulnerability Scoring System (CVSS) scores measure the severity of vulnerabilities but don’t capture the unique risks they pose to specific environments. Risk is context-dependent, and organizations must consider factors like exploitability, impact and mitigation to tailor vulnerability management to their needs.
Today, many organizations are still measuring the security of their environments by CVSS scores alone. While CVSS is an important tool for understanding the severity of a vulnerability, equating it directly to risk is a mistake.
Risk ≠ Severity
The CVSS score is designed to evaluate the technical severity of a vulnerability, but the risk is about much more than that. Assessing risk also includes:
- Exposure: Is the vulnerable component accessible in your environment?
- Business Impact: What’s at stake if this vulnerability is exploited?
- Likelihood: How feasible is it for an attacker to exploit this specific issue in your setup?
For example, a high CVSS vulnerability in a component that isn’t exposed to the internet and is rarely used in your infrastructure may not pose any risk. On the other hand, a high CVSS issue in an application directly exposed to customers could have serious consequences.
Moving the needle on risk awareness
At Red Hat, we’ve been working to help organizations think about risk more holistically. As my colleague Jeremy West pointed out in his recent article, Do software security features matter in the world of vulnerability remediation?, CVSS is a valuable tool, but it’s just one part of the puzzle. We need to elevate the conversation to address the broader picture. This means going beyond the CVSS score and considering the following factors:
- Context: Understanding where and how the vulnerability exists in your environment
- Mitigations: Are there existing measures that reduce the likelihood or impact of an exploit?
- Mitigation examples:
- Firewalls to block suspicious IPs attempting unauthorized access
- IDS/IPS to monitor network traffic and stop unusual patterns
- Automated monitoring tools to identify vulnerabilities, such as unpatched software, and trigger alerts for remediation
- Mitigation examples:
- Prioritization: Allocating resources to address issues that pose the most significant risks to the business
Risk-based security
Risk-based security involves assessing potential threats, vulnerabilities, and their impact, then focusing resources on the most critical risks. To better understand this, let’s use a home security analogy:
- Identifying risks
- Threats: Burglars, natural disasters, or accidents, such as fires
- Vulnerabilities: Unlocked doors, windows without locks, or a lack of fire detectors
- Impact: Loss of valuables, damage to property, or harm to residents
- Risk assessment
- Likelihood: How likely is a burglary? A home in a high-crime area has a greater risk compared to one in a gated community
- Severity: A break-in might result in stolen items, while a fire could lead to complete property loss or injuries
- Risk mitigation
- High-risk focus: Address vulnerabilities with the highest impact and likelihood first.
- Install a sturdy lock on the front door
- Add smoke detectors in key areas like the kitchen and bedrooms
- Low-risk items: A backyard shed may not need advanced security if it only contains garden tools
- High-risk focus: Address vulnerabilities with the highest impact and likelihood first.
- Ongoing monitoring and adaptation
- Regularly review and adapt your approach, for example, if you purchase a new, expensive television, consider adding window sensors or upgrading to a security camera system
- Emerging threats: If a neighbour reports a break-in, adjust your strategy with motion-detecting lights
Key takeaway
Risk-based security prioritizes efforts where they matter most. At Red Hat, we allocate resources to address the most likely and impactful risks rather than trying to eliminate every possible vulnerability.
The way forward
Shifting to a risk-based mindset requires:
- Collaboration between security and operations teams to identify the real-world impact of vulnerabilities
- Improved tooling and processes to bring better visibility to risk
- Ongoing education to move past CVSS as the sole measure of importance
A call to action
As we look ahead, the goal remains clear: making risk, not severity, the driving factor in vulnerability management. 2025 is the year we need to finally move past outdated thinking to focus our resources on what truly matters: reducing real-world risk, not just chasing scores.
product trial
Red Hat Advanced Cluster Security Cloud Service | versione di prova
Sull'autore
Joined Red Hat in 2019, where they focus on driving proactive secure development initiatives within the Product Security team.
Altri risultati simili a questo
Ricerca per canale
Automazione
Novità sull'automazione IT di tecnologie, team e ambienti
Intelligenza artificiale
Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque
Hybrid cloud open source
Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido
Sicurezza
Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti
Edge computing
Aggiornamenti sulle piattaforme che semplificano l'operatività edge
Infrastruttura
Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale
Applicazioni
Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili
Serie originali
Raccontiamo le interessanti storie di leader e creatori di tecnologie pensate per le aziende
Prodotti
- Red Hat Enterprise Linux
- Red Hat OpenShift
- Red Hat Ansible Automation Platform
- Servizi cloud
- Scopri tutti i prodotti
Strumenti
- Formazione e certificazioni
- Il mio account
- Supporto clienti
- Risorse per sviluppatori
- Trova un partner
- Red Hat Ecosystem Catalog
- Calcola il valore delle soluzioni Red Hat
- Documentazione
Prova, acquista, vendi
Comunica
- Contatta l'ufficio vendite
- Contatta l'assistenza clienti
- Contatta un esperto della formazione
- Social media
Informazioni su Red Hat
Red Hat è leader mondiale nella fornitura di soluzioni open source per le aziende, tra cui Linux, Kubernetes, container e soluzioni cloud. Le nostre soluzioni open source, rese sicure per un uso aziendale, consentono di operare su più piattaforme e ambienti, dal datacenter centrale all'edge della rete.
Seleziona la tua lingua
Red Hat legal and privacy links
- Informazioni su Red Hat
- Opportunità di lavoro
- Eventi
- Sedi
- Contattaci
- Blog di Red Hat
- Diversità, equità e inclusione
- Cool Stuff Store
- Red Hat Summit