{
  "title": "How to Build a Risk-Based Vulnerability Remediation Plan to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - RA.L2-3.11.3",
  "date": "2026-04-14",
  "author": "Lakeridge Technologies",
  "featured_image": "/assets/images/blog/2026/4/how-to-build-a-risk-based-vulnerability-remediation-plan-to-meet-nist-sp-800-171-rev2-cmmc-20-level-2-control-ral2-3113.jpg",
  "content": {
    "full_html": "<p>Developing a risk-based vulnerability remediation plan is a practical requirement under NIST SP 800-171 Rev.2 and mapped CMMC 2.0 Level 2 control RA.L2-3.11.3; this post shows you how to design, implement, and document a plan that a small business can operate, evidence for assessors, and maintain over time to protect Controlled Unclassified Information (CUI).</p>\n\n<h2>What RA.L2-3.11.3 is asking for (objectives and scope)</h2>\n<p>The core objective of RA.L2-3.11.3 is to ensure the organization has a documented, repeatable, and risk-based process to remediate vulnerabilities in systems that handle or affect CUI. Practically that means: identify assets, scan and discover vulnerabilities, assess risk using objective criteria, prioritize remediation actions, track work to completion, and document exceptions and compensating controls. For compliance evidence you should be able to show policies, runbooks, vulnerability scan results, prioritization criteria, remediation tickets, and reviewer sign-offs.</p>\n\n<h2>Step 1 — Build and maintain an accurate asset inventory</h2>\n<h3>Asset identification and CUI mapping</h3>\n<p>Start with a Configuration Management Database (CMDB) or even a simple inventory spreadsheet that lists each asset (hostname, IP, owner, environment, business function) and tags whether it stores, processes, or transmits CUI. For a small defense subcontractor with ~50 employees, an initial practical approach is: enumerate servers, workstations, mobile devices, cloud services (Azure/ AWS accounts), and third-party SaaS. Include software versions, exposed services and authentication domains. Assign an owner for each asset so remediation actions have a responsible party.</p>\n\n<h2>Step 2 — Discover vulnerabilities and enrich findings</h2>\n<h3>Scanning cadence and authenticated scanning</h3>\n<p>Implement automated vulnerability scanning on a cadence appropriate to risk: weekly authenticated scans for internet-facing assets, monthly for internal servers, and quarterly for endpoints if you're doing continuous patching. Use tools like Nessus, OpenVAS, Qualys, or cloud-native scanners, and always run authenticated scans with a purpose-built service account (least privileges needed to enumerate patches and installed packages). Supplement automated scans with endpoint telemetry from EDR (CrowdStrike, Microsoft Defender) to capture runtime indicators and exploited vulnerabilities.</p>\n\n<h2>Step 3 — Prioritize using risk-based criteria (technical and business context)</h2>\n<h3>Scoring and SLA mapping</h3>\n<p>Use CVSSv3 base scores as a starting point, but modify prioritization by exploitability, public exploit availability, asset criticality (CUI exposure), and compensating controls (network segmentation, WAF). Example SLA matrix used by many small organizations: Critical (CVSS ≥9.0 or known exploit on CUI system) — remediate within 7 days; High (CVSS 7.0–8.9) — 30 days; Medium (CVSS 4.0–6.9) — 90 days; Low (<4.0) — monitor on patch cycle. For a small shop, further escalate anything with active exploit code or kernel/privilege escalation to emergency change windows and an incident review.</p>\n\n<h2>Step 4 — Define workflows, tools, and remediation actions</h2>\n<h3>Ticketing, patch testing, and rollback plans</h3>\n<p>Document the remediation workflow: vulnerability finding → ticket creation in your ITSM (Jira, ServiceNow, or a disciplined spreadsheet for very small teams) → owner assignment → test patch in staging → deploy during maintenance window → verify and close ticket with evidence (screenshots, patch output, scan re-run). Use management tools for automated patch deployment: WSUS/SCCM or Intune for Windows, Ansible or Chef for Linux, and package manager automation for cloud services. Include runbooks for emergency fixes (out-of-band patches) and a rollback plan for failed updates to avoid business disruption.</p>\n\n<h2>Step 5 — Exceptions, compensating controls, and documentation</h2>\n<h3>Controlled exceptions and continuous monitoring</h3>\n<p>Not every vulnerability can be immediately remediated (legacy apps, vendor constraints). Define an exception policy: require documented business justification, risk acceptance by a manager, compensating controls (network isolation, strict firewall rules, increased logging/IDS rules), a time-boxed mitigation plan, and periodic re-evaluation. Maintain an exceptions register as compliance evidence and instrument increased monitoring (SIEM alerts, host-based integrity checks) for those assets until mitigation completes.</p>\n\n<h2>Tools, metrics, and integrations to demonstrate ongoing compliance</h2>\n<p>Integrate vulnerability scanners with your CMDB and ticketing system to auto-create and update tickets. Feed remediation status into your SIEM (Splunk, Azure Sentinel) for correlation with threat activity. Track KPIs that assess program health: average time-to-remediate (MTTR) by severity, percentage of critical findings remediated within SLA, open-backlog age, and number of accepted exceptions. For audit readiness, keep a folder (or a records retention repo) with sample artifacts: the policy, a few representative scan reports with dates, remediation tickets, exception forms, and meeting notes from risk reviews.</p>\n\n<h2>Risks of not implementing a risk-based remediation plan and practical compliance tips</h2>\n<p>Failing to implement this requirement exposes your organization to exploited vulnerabilities, CUI disclosure, forensic costs, potential loss of DoD contracts, and failing a CMMC assessment. Practical tips: prioritize systems that touch CUI, automate as much as possible to compensate for limited staff, use a managed service provider for scanning or patch orchestration if needed, run quarterly tabletop exercises to validate the workflow, and keep remediation evidence organized for assessors. Small businesses should emphasize documentation and repeatability—assessors look for proof that the program is operational, not just aspirational.</p>\n\n<p>In summary, meeting RA.L2-3.11.3 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 means instituting a documented process that ties discovery to prioritized remediation, assigns owners, enforces SLAs, tracks exceptions, and produces auditable evidence. For small organizations, start simple: inventory CUI assets, run authenticated scans, adopt clear prioritization thresholds, automate ticketing and patching where possible, and retain clear records demonstrating the program actively reduces risk.",
    "plain_text": "Developing a risk-based vulnerability remediation plan is a practical requirement under NIST SP 800-171 Rev.2 and mapped CMMC 2.0 Level 2 control RA.L2-3.11.3; this post shows you how to design, implement, and document a plan that a small business can operate, evidence for assessors, and maintain over time to protect Controlled Unclassified Information (CUI).\n\nWhat RA.L2-3.11.3 is asking for (objectives and scope)\nThe core objective of RA.L2-3.11.3 is to ensure the organization has a documented, repeatable, and risk-based process to remediate vulnerabilities in systems that handle or affect CUI. Practically that means: identify assets, scan and discover vulnerabilities, assess risk using objective criteria, prioritize remediation actions, track work to completion, and document exceptions and compensating controls. For compliance evidence you should be able to show policies, runbooks, vulnerability scan results, prioritization criteria, remediation tickets, and reviewer sign-offs.\n\nStep 1 — Build and maintain an accurate asset inventory\nAsset identification and CUI mapping\nStart with a Configuration Management Database (CMDB) or even a simple inventory spreadsheet that lists each asset (hostname, IP, owner, environment, business function) and tags whether it stores, processes, or transmits CUI. For a small defense subcontractor with ~50 employees, an initial practical approach is: enumerate servers, workstations, mobile devices, cloud services (Azure/ AWS accounts), and third-party SaaS. Include software versions, exposed services and authentication domains. Assign an owner for each asset so remediation actions have a responsible party.\n\nStep 2 — Discover vulnerabilities and enrich findings\nScanning cadence and authenticated scanning\nImplement automated vulnerability scanning on a cadence appropriate to risk: weekly authenticated scans for internet-facing assets, monthly for internal servers, and quarterly for endpoints if you're doing continuous patching. Use tools like Nessus, OpenVAS, Qualys, or cloud-native scanners, and always run authenticated scans with a purpose-built service account (least privileges needed to enumerate patches and installed packages). Supplement automated scans with endpoint telemetry from EDR (CrowdStrike, Microsoft Defender) to capture runtime indicators and exploited vulnerabilities.\n\nStep 3 — Prioritize using risk-based criteria (technical and business context)\nScoring and SLA mapping\nUse CVSSv3 base scores as a starting point, but modify prioritization by exploitability, public exploit availability, asset criticality (CUI exposure), and compensating controls (network segmentation, WAF). Example SLA matrix used by many small organizations: Critical (CVSS ≥9.0 or known exploit on CUI system) — remediate within 7 days; High (CVSS 7.0–8.9) — 30 days; Medium (CVSS 4.0–6.9) — 90 days; Low (\n\nStep 4 — Define workflows, tools, and remediation actions\nTicketing, patch testing, and rollback plans\nDocument the remediation workflow: vulnerability finding → ticket creation in your ITSM (Jira, ServiceNow, or a disciplined spreadsheet for very small teams) → owner assignment → test patch in staging → deploy during maintenance window → verify and close ticket with evidence (screenshots, patch output, scan re-run). Use management tools for automated patch deployment: WSUS/SCCM or Intune for Windows, Ansible or Chef for Linux, and package manager automation for cloud services. Include runbooks for emergency fixes (out-of-band patches) and a rollback plan for failed updates to avoid business disruption.\n\nStep 5 — Exceptions, compensating controls, and documentation\nControlled exceptions and continuous monitoring\nNot every vulnerability can be immediately remediated (legacy apps, vendor constraints). Define an exception policy: require documented business justification, risk acceptance by a manager, compensating controls (network isolation, strict firewall rules, increased logging/IDS rules), a time-boxed mitigation plan, and periodic re-evaluation. Maintain an exceptions register as compliance evidence and instrument increased monitoring (SIEM alerts, host-based integrity checks) for those assets until mitigation completes.\n\nTools, metrics, and integrations to demonstrate ongoing compliance\nIntegrate vulnerability scanners with your CMDB and ticketing system to auto-create and update tickets. Feed remediation status into your SIEM (Splunk, Azure Sentinel) for correlation with threat activity. Track KPIs that assess program health: average time-to-remediate (MTTR) by severity, percentage of critical findings remediated within SLA, open-backlog age, and number of accepted exceptions. For audit readiness, keep a folder (or a records retention repo) with sample artifacts: the policy, a few representative scan reports with dates, remediation tickets, exception forms, and meeting notes from risk reviews.\n\nRisks of not implementing a risk-based remediation plan and practical compliance tips\nFailing to implement this requirement exposes your organization to exploited vulnerabilities, CUI disclosure, forensic costs, potential loss of DoD contracts, and failing a CMMC assessment. Practical tips: prioritize systems that touch CUI, automate as much as possible to compensate for limited staff, use a managed service provider for scanning or patch orchestration if needed, run quarterly tabletop exercises to validate the workflow, and keep remediation evidence organized for assessors. Small businesses should emphasize documentation and repeatability—assessors look for proof that the program is operational, not just aspirational.\n\nIn summary, meeting RA.L2-3.11.3 under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 means instituting a documented process that ties discovery to prioritized remediation, assigns owners, enforces SLAs, tracks exceptions, and produces auditable evidence. For small organizations, start simple: inventory CUI assets, run authenticated scans, adopt clear prioritization thresholds, automate ticketing and patching where possible, and retain clear records demonstrating the program actively reduces risk."
  },
  "metadata": {
    "description": "Step-by-step guidance for small businesses to create a risk-based vulnerability remediation plan that satisfies NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 RA.L2-3.11.3, including SLA templates, tooling, and real-world examples.",
    "permalink": "/how-to-build-a-risk-based-vulnerability-remediation-plan-to-meet-nist-sp-800-171-rev2-cmmc-20-level-2-control-ral2-3113.json",
    "categories": [],
    "tags": []
  }
}