🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Prioritize Vulnerabilities Using Risk Scores to Comply with NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - RA.L2-3.11.3

Learn how to use risk-based vulnerability scoring to meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 RA.L2-3.11.3 and protect Controlled Unclassified Information (CUI).

•
April 06, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 Control RA.L2-3.11.3 require organizations handling Controlled Unclassified Information (CUI) to prioritize vulnerabilities based on risk so that limited resources focus on the issues that present the greatest threat to confidentiality, integrity and availability; this post explains a practical, auditable approach to build risk scores, automate prioritization, and document decisions for compliance with the Compliance Framework.

What RA.L2-3.11.3 requires in practice

The control centers on producing and using risk-based prioritization for vulnerability management rather than treating every finding equally—your program must demonstrate that scanning, triage, patching or mitigation decisions are driven by risk to CUI. For Compliance Framework implementations this means maintaining an accurate asset inventory of CUI-bearing systems, scoring vulnerabilities against business impact and exploitability, applying documented SLAs/mitigation workflows by risk tier, and retaining artifacts (scan reports, tickets, mitigation evidence) to satisfy auditors.

Build a practical risk-scoring model

A useful risk score combines technical severity (CVSS v3.1 base score), exposure (internet-facing or not), asset criticality (data classification and mission impact), and threat context (public exploit availability / active exploitation). Example weighted formula: RiskScore(0-100) = round(100 * (0.50 * (CVSS_base/10) + 0.25 * (AssetCriticality/5) + 0.15 * Exposure + 0.10 * ThreatIntel)). Here AssetCriticality is 1–5 (5 = hosts processing CUI), Exposure is 0 or 1 (0.5 for DMZ/internal with VPN), ThreatIntel is 0–1 based on exploit maturity (0 = none, 1 = active exploit). That formula is simple to compute in any vulnerability management platform or SIEM and produces three practical tiers: 85–100 = Critical, 60–84 = High, 30–59 = Medium, <30 = Low.

Implementing the model for a small business

Small businesses (e.g., a 50–200 employee subcontractor) can implement this without heavy tooling. Step 1: inventory CUI assets using a CSV or CMDB and tag them in your scanner. Step 2: run authenticated weekly scans on servers and monthly on desktops using open-source (OpenVAS/GVM) or commercial scanners (Tenable, Qualys). Step 3: compute the risk score in a spreadsheet or ingest scan output into a lightweight platform (Kenna, DefectDojo) and apply the above formula. Step 4: define SLAs: Critical = 24–72 hours, High = 7 days, Medium = 30 days, Low = next patch cycle. Step 5: document exceptions with compensating controls, mitigations, and an approval workflow tied to change control.

Real-world small-business scenario

Example: A small defense subcontractor scans and finds a public-facing web application with CVE-2024-12345 rated CVSS 9.8 and proof-of-concept exploit in the wild. AssetCriticality = 5 (hosts CUI), Exposure = 1 (internet-facing), ThreatIntel = 1 (active exploit). RiskScore ≈ 100 (Critical). Action: create an emergency ticket, apply a virtual patch (WAF rule) within 4 hours, isolate the host to a quarantine VLAN, schedule vendor patch within 24 hours, and capture evidence (WAF logs, ACL changes, patch record). For audit, export the scan, ticket, and change logs showing timeline and decision rationale. This demonstrates RA.L2-3.11.3 compliance: risk-driven prioritization and documented mitigation.

Technical integration and automation

To scale, integrate scanners with ticketing (ServiceNow/Jira) and SOAR playbooks. Use scanner APIs to push CVE, CVSS and asset tags into a vulnerability management database, calculate the RiskScore programmatically, and auto-create tickets with priority and SLA fields. Enrich with threat feeds (CISA KEV, ExploitDB, Recorded Future) to set ThreatIntel. Configure automated actions for Critical scores (e.g., apply WAF signature, isolate via SDN, deploy EDR containment) and require manual approval only for exception documentation. Ensure logs (SIEM) collect and retain timestamps for detection, triage and remediation to satisfy auditors assessing timelines.

Compliance tips and best practices

Maintain an auditable trail: store raw scan exports, normalized risk scores, tickets, change approvals and test/verification evidence in a compliance binder or secure document repository. Define and document your scoring formula in your risk management policy and map it to the Compliance Framework control RA.L2-3.11.3. Implement an exception process with documented compensating controls (segmentation, MFA, logging) and periodic review cadence. Key metrics: Mean Time to Remediate (MTTR) by tier, % of CUI assets scanned on schedule, and % of Critical vulnerabilities mitigated within SLA—these are the primary artifacts auditors will look for.

Failing to implement risk-based prioritization increases the chance of an exploitable vulnerability leading to CUI exfiltration, service disruption, contract penalties, and loss of eligibility to handle federal contracts; beyond regulatory consequences, undifferentiated remediation wastes scarce IT resources and delays fixes to truly critical issues. By adopting a clear scoring model, automating enrichment and workflows, and keeping structured evidence, small businesses can meet RA.L2-3.11.3, reduce real risk, and demonstrate compliance with NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes