Closure rule: a vulnerability is not closed because a ticket says done. It is closed when the outcome, evidence, owner, validation method, and follow-up condition are recorded.
Remediation Evidence Pack
Define what fixed means before closing the work.
Use this page after patching, mitigation, detection, exception approval, or monitoring work so closure is backed by proof instead of hope.
Patch
Installedfixed version, change record, validationMitigate
Controlledscope, control proof, residual riskDetect
Visiblerule, query, telemetry, test resultAccept
Approvedowner, expiry, review triggerOutcome Evidence
What proof to collect for each closure path
Patched
Fixed version is installed and verified
Capture asset group, previous version, fixed version, change ticket, rollout date, validation method, rollback status, and any failed assets.
Mitigated
Exposure is reduced while patching continues
Capture control type, affected scope, deployment proof, expected coverage, bypass limits, residual risk, owner, and review date.
Detected
SOC has validated visibility
Capture telemetry source, field mapping, query or rule, test result, false-positive risk, alert owner, and known visibility gaps.
Accepted
Residual risk is time-bound and owned
Capture approval owner, reason, compensating controls, expiry date, trigger for re-review, and evidence that alternatives were considered.
Not affected
Exposure validation disproves relevance
Capture product/version mismatch, asset inventory proof, reachability evidence, owner confirmation, and date of validation.
Monitoring
Decision is to watch for change
Capture watch reason, source to monitor, trigger conditions, owner, review date, and what would move the item to patch or mitigation.
Closure Gates
Do not close work until these questions are answered
Can we prove the scope?
The evidence names affected assets, products, versions, owners, and which systems remain unresolved or excluded.
Can we prove the outcome?
The ticket has proof of fixed version, control deployment, detection validation, acceptance approval, or not-affected status.
Can we prove the date?
The evidence includes change time, validation time, review date, expiry date, or trigger condition for future review.
Can we explain residual risk?
The closure note says what remains exposed, monitored, accepted, blocked, or waiting for vendor guidance.
Audit Trail
Evidence that helps later reviews and leadership updates
Before state
Original affected version, exposure state, risk signal, source confidence, owner, and reason work was prioritized.
Decision state
Chosen lane, approver, deadline, exception reason, or detection request that guided the work.
After state
Fixed version, control proof, detection test, accepted risk expiry, not-affected proof, or monitoring trigger.
Follow-up state
Review date, unresolved assets, residual risk, source watch, owner handoff, or next reporting checkpoint.
Copy Template
Closure evidence note
Closure outcome: [patched / mitigated / detected / accepted / not affected / monitoring] Scope: [asset group, product, version, owner] Evidence: [fixed version, control proof, rule/query test, approval, inventory proof] Validation method: [scan, owner confirmation, telemetry check, change record, vendor guidance] Residual risk: [none / accepted / monitored / unresolved assets / vendor dependency] Review trigger: [date, KEV change, PoC release, exposure change, vendor update] Owner: [team/person]. Evidence location: [ticket/reference]
Recommended next move: save the item, add closure evidence, then use Action Tracker and Brief Builder to keep unresolved risk visible.