Why We’ll Never Patch Everything, and That’s Okay
文章指出漏洞管理的复杂性与挑战,强调从数量转向风险评估的重要性。传统方法依赖CVSS评分忽视实际风险,需结合环境因素与业务影响进行优先级排序。资产管理与安全配置管理是基础,补丁验证不可或缺。漏洞管理需经验与技术结合以应对持续威胁。 2025-12-16 07:0:44 Author: securityboulevard.com(查看原文) 阅读量:7 收藏

For more than two decades, I’ve worked in vulnerability management, and one truth has never changed: No organization — no matter how well-funded or well-intentioned — will ever be able to fix every vulnerability. 

The volume, speed and complexity of today’s vulnerabilities make complete remediation impossible. Every month, the industry braces for another wave of patches from Microsoft, Oracle, Apple and dozens of others.  

Yet, many of those vulnerabilities pose little or no real-world risk to your specific environment. 

The real challenge isn’t how to patch faster, it’s how to decide what not to patch. 

The Numbers Game is Over 

For years, vulnerability management (VM) has been a numbers game. Vendors bragged about how many common vulnerabilities and exposures (CVEs) they detected, and organizations felt compelled to chase each one. The result is endless reports, bloated dashboards and security teams burning cycles on issues that will never be exploited. 

This approach made sense when VM tools were new and visibility was the goal. However, visibility without prioritization is just noise dressed as progress. 

The industry needs to shift from counting vulnerabilities to understanding them. The focus must move from quantity to context: What the vulnerability affects, where it sits in your environment and whether anyone could realistically use it to hurt you. 

It’s About Risk, Not Severity 

One of the biggest misconceptions in vulnerability management is the reliance on Common Vulnerability Scoring System (CVSS) scores as a proxy for risk. CVSS measures severity — not likelihood or impact. Treating severity as risk leads to bad decisions and wasted effort. 

Let’s say a library inside an internal app has a ‘critical’ CVSS score. It’s never been exploited, has no attack vector and sits deep in your internal network. Should that be patched before an external-facing device with a moderate but exploitable bug? Absolutely not. 

Security teams need to prioritize based on risk, not severity. That means weighing exploitability, exposure and business impact, not just a numerical score. 

CVSS Isn’t the Enemy, Misuse Is 

You shouldn’t blame CVSS for the industry’s overreliance on it. The problem lies in its adoption. CVSS was designed to provide a universal language for severity, not to dictate prioritization. Yet somewhere along the line, ‘severity equals risk’ became the default assumption. 

CVSS v4 now allows for more contextual scoring, factoring in temporal and environmental variables to get closer to a true risk measure. Unfortunately, most organizations don’t have the resources to rescore thousands of vulnerabilities every month. 

What should be recommended is blending CVSS with additional intelligence sources: 

  • Exploit Prediction Scoring System (EPSS): Shows the probability that a vulnerability will be exploited in the next 30 days 
  • Known Exploited Vulnerabilities (KEV): Lists vulnerabilities currently being exploited in the wild 

When combined with internal context — such as asset criticality, network exposure and data sensitivity — this approach provides a far clearer picture of what truly matters. 

Asset Knowledge is Power 

You can’t manage what you can’t see. Asset management is foundational to effective vulnerability management because it tells you where your real risks live. Knowing your ‘crown jewels’ (the systems that hold critical data or deliver key services) lets you prioritize intelligently. A vulnerability on a test server with no real data should never compete with one on a customer database sitting behind an exposed IP. 

It’s also about knowing your network layout: Which systems are in the demilitarized zone (DMZ), which are internal and which are isolated. A privilege escalation flaw on an internal server doesn’t carry the same urgency as code execution on a web-facing edge device. 

When you understand your assets, your attack surface and how data flows between them, prioritization stops being guesswork. 

Cyber Hygiene Still Matters 

Security teams should group the ‘basics’ into two categories: 

  1. Vulnerability Management: Finding, assessing and prioritizing weaknesses 
  2. Security Configuration Management: Ensuring systems are hardened, compliant and monitored for changes 

Asset management sits inside that first category. You can’t manage vulnerabilities without knowing what software and systems exist in your environment. Even with perfect prioritization, there will always be gaps. Some vulnerabilities will be missed. Some patches will arrive too late. That’s where hardening and secure configurations come in. 

A hardened environment limits attacker options when something slips through. Configuration baselines such as CIS benchmarks or frameworks including PCI DSS are shields that limit the real-world impact of inevitable vulnerability gaps. 

Patch Management Isn’t a Panacea 

Patch management is a key operational function, but it’s hardly a vulnerability management strategy. Too many companies rely solely on patch management tools, assuming ‘patched equals safe’. 

All too frequently, patching tools mark a vulnerability as remediated when, in reality, the system remains exposed. Why? It’s because the patch was applied, but the post-patch configuration step — the registry key, the service restart and the permissions change — never happened. 

That’s why vulnerability scanning and validation must complement patch management. You need to verify not just that patches were deployed, but that vulnerabilities are truly mitigated. 

Fear Shouldn’t Drive Patching 

Every Patch Tuesday, headlines warn of critical flaws and ‘must-apply-now’ fixes. It’s easy to panic, but not every ‘critical’ patch deserves the same urgency. 

Before pushing an update that could break production, pause and ask: 

  • Is this vulnerability being actively exploited? 
  • Is there exploit code available? 
  • Can we mitigate it temporarily with network controls, firewalls or segmentation? 
  • What’s the business impact if patching causes downtime? 

Security decisions must balance business risk and cybersecurity risk. If your entire revenue stream depends on an online platform, you can’t afford to take it down without a plan. Sometimes, deploying a web application firewall or access control rule buys the time you need to patch safely. 

This is intelligent risk management. 

Security is an Art, Not a Formula 

The truth is that vulnerability management isn’t an exact science; it’s an art informed by experience. The best practitioners develop a kind of gut instinct, a sense built over years of seeing what gets exploited and what doesn’t. 

Automation helps, but experience is irreplaceable. That’s why external security teams exist: To apply research, threat intelligence and decades of practical experience to help organizations navigate this complexity. 

These teams can’t promise to fix every vulnerability; no one can. However, they can help you understand which ones truly matter, and this understanding is what keeps businesses resilient in a world where new vulnerabilities will always outnumber the hours in a day.  

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/12/why-well-never-patch-everything-and-thats-okay/
如有侵权请联系:admin#unsafe.sh