🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Measure and Improve Time-to-Remediate: KPIs and Implementation Steps for SI.L1-B.1.XII — FAR 52.204-21 / CMMC 2.0 Level 1 - Control - SI.L1-B.1.XII

Practical guidance to measure, report, and reduce Time-to-Remediate (TTR) to meet SI.L1-B.1.XII under FAR 52.204-21 and CMMC 2.0 Level 1 compliance.

April 10, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Time-to-Remediate (TTR) is a critical performance metric for meeting SI.L1-B.1.XII under the Compliance Framework aligning with FAR 52.204-21 and CMMC 2.0 Level 1: it measures how quickly vulnerabilities and security issues are resolved after detection, and reducing TTR demonstrably lowers the window of exposure for covered contractor information systems.

Why TTR matters for SI.L1-B.1.XII and basic safeguarding

SI.L1-B.1.XII emphasizes timely corrective actions for identified flaws and basic safeguarding obligations in FAR 52.204-21 require contractors to protect controlled unclassified information; both call for processes that minimize the period an exploitable weakness exists. For small businesses working under government contracts, a documented, measurable TTR program is concrete evidence in an audit or assessment that you actively manage risk rather than just detect it.

KPIs to measure Time-to-Remediate

Define a small set of KPIs you will report regularly. Core indicators include: Mean Time to Remediate (MTTR) = sum(remediation_end - remediation_start)/N, Median TTR, 90th percentile TTR (to capture tail risks), Percent Remediated Within SLA (by severity), and Open Remediation Backlog Age (count of unresolved issues older than SLA). For severity mapping use CVSS scores or a simple tier (Critical/High/Medium/Low) and set explicit SLAs per tier (example: Critical ≤ 72 hours, High ≤ 14 days, Medium ≤ 30 days, Low ≤ 90 days).

Calculations, tracking and sample queries

Capture remediation start and end timestamps in your ticketing or VM platform. Example SQL-like calculation for average hours in a ticketing system: SELECT AVG(DATEDIFF(hour, remediation_start, remediation_end)) AS avg_hours FROM tickets WHERE severity='High' AND remediation_end IS NOT NULL AND remediation_start IS NOT NULL AND remediation_end BETWEEN '2026-01-01' AND '2026-03-31'; integrate this with dashboards (Grafana, Power BI, or vendor consoles). Also track percent-in-SLA: SELECT COUNT(*) FILTER(WHERE DATEDIFF(hour, remediation_start, remediation_end) <= sla_hours)/COUNT(*)*100.

Implementation steps specific to the Compliance Framework

1) Inventory and classification: build an asset inventory (spreadsheet or CMDB) and tag assets by criticality and whether they handle covered contractor information. 2) Detection & prioritization: schedule regular vulnerability scans (Nessus, OpenVAS, Qualys) and endpoint telemetry (EDR). Map findings to severity and business impact, then automatically generate tickets with severity and SLA fields. 3) Triage and assignment: define roles (owner, approver, remediator) and use an intake workflow in a ticketing system (Jira Service Management, ServiceNow, or a simpler helpdesk) to ensure every finding has an owner and a remediation plan. 4) Remediation playbooks: create step-by-step remediation runbooks — e.g., for Windows patching use Intune/WSUS with a testing ring, for Linux update packages via Ansible playbook, for config hardening apply CIS benchmark scripts. 5) Validate and close: require post-remediation validation scans and attach evidence (scan report, configuration change, rollback plan) to tickets before closure. 6) Reporting and continuous improvement: automate KPI reports weekly/monthly and run quarterly review meetings to refine SLAs and playbooks.

Small-business scenario (practical example)

Consider a 50-user small business that handles limited CUI. Tools: Microsoft Intune for endpoint management, Nessus for vulnerability scanning, and Jira Service Desk for ticketing. Implementation: tag Windows servers and laptops in Intune as 'CUI-handling', schedule Nessus scans weekly, auto-create Jira tickets for findings with CVSS ≥ 5 mapped to 'High' and SLA 14 days. Remediation runbook: apply Intune patch ring to a 3-device test group, monitor for 48 hours, then stage to remaining machines. Post-deployment, a Nessus re-scan validates closure and the ticket is closed with the export attached. Over three months the business measures MTTR reduced from 20 days to 9 days and percent-in-SLA for High issues improves from 60% to 95%.

Compliance tips, best practices, and risk of non-implementation

Best practices: automate where possible to reduce human delay (auto-ticketing, automated patch deployment), maintain a prioritized asset list for faster targeting, tune scanners to reduce false positives, and keep remediation evidence in a single, searchable repository for audits. Build realistic SLAs based on resource capacity — overly aggressive targets cause churn and workarounds that impair auditability. Maintain evidence trails: change tickets, approval logs, screenshots, scan diffs, and rollback plans. Regular tabletop exercises help validate workflows and staffing assumptions.

Risks of not implementing a measured TTR program include prolonged exposure to known vulnerabilities, increased chance of data breach (which may trigger FAR breach reporting obligations), contract penalties or loss, reputational damage, and failure in a CMMC assessment. For small businesses, a single exploited vulnerability could terminate a government contract or lead to costly forensic and remediation expenses.

Summary: To meet SI.L1-B.1.XII and satisfy FAR 52.204-21 / CMMC 2.0 Level 1 expectations, build a simple but auditable TTR program: inventory assets, automate detection and ticketing, set severity-aligned SLAs, implement playbooks and validation scans, and report KPIs (MTTR, median, percentile, percent-in-SLA). Start small, focus on consistency and evidence, and iterate: reducing your Time-to-Remediate is one of the most effective ways a small business can demonstrate it is actively protecting covered contractor information.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes