First 10 Minutes

Start triage without turning noise into panic.

Use this short routine when a new CVE, advisory, KEV item, vendor note, or exploit rumor lands and you need a defensible first read before assigning work.

Goaldirection

Know whether to patch, mitigate, monitor, escalate, or investigate.

Outputowner ask

Leave with a clear next step, evidence gap, or handoff target.

Avoidoverclaiming

Do not treat score, PoC, KEV, or scanner output as proof of exposure by itself.

Use whenfresh signal

New vulnerability pressure appears and the team needs a quick first pass.

A calm triage sequence

The first pass should reduce uncertainty, not solve every detail. Stop when you have enough evidence to choose the next owner.

Name the signal

Capture the CVE, vendor advisory, product family, source, first-seen time, and whether the signal is score, exploit, patch, exposure, or news.

Open: Search, CVEs, Advisories, or Detail.

SearchDetail Walkthrough

Separate proof from pressure

Ask what is confirmed: affected versions, fixed build, KEV, public PoC, exposure, authentication, reachable asset, vendor guidance, or only a scanner match.

Rule: pressure helps prioritize validation; proof supports assignment.

Evidence ChecklistSignal Sorter

Check exposure fit

Decide whether the product exists, whether affected versions are present, whether it is internet-facing or sensitive, and whether compensating controls already reduce reachability.

Watch: external exposure, unauthenticated paths, identity surfaces, edge devices, and business-critical services.

Exposure OpsAttack Surface

Choose the action lane

Pick patch when a fix and confirmed exposure exist, mitigate when risk needs reduction before patching, monitor when exposure is weak, escalate when ownership or approval blocks progress, and investigate when evidence is missing.

Do not: create urgent work from score alone.

Patch vs MitigateDecision Matrix

Write the next owner ask

Send a specific ask with evidence, owner, deadline, fallback, and what to return if blocked. If no owner is known, escalate ownership instead of letting the item drift.

Good ask: what changed, why it matters, what decision is needed, and by when.

Handoff CenterHandoff Drill

Keep the follow-up visible

Save the record, add state and owner notes, and set a review date for monitoring, mitigation, no-patch, or exception decisions.

Close only with: patch evidence, mitigation evidence, not-affected proof, accepted risk, or a documented review.

SavedAction Tracker

Common first-pass outcomes

Patch now candidate

Known exploited or high-confidence exploit pressure, reachable affected asset, fixed version available, owner known, and rollback path understood.

Patch Watch

Mitigate first candidate

No fixed build, unsafe patch, delayed window, or high exposure where access restriction, workaround, segmentation, or detection can reduce risk now.

Control Matchmaker

Investigate candidate

Signal is plausible but affected versions, reachability, source confidence, or business ownership are not confirmed yet.

Evidence Checklist

Escalate candidate

Business impact, unknown owner, downtime approval, vendor delay, customer impact, or incident-response threshold needs a higher decision.

Escalation Ladder