Free Tool

Vulnerability Remediation Runbook Template
one operational procedure for intake, triage, SLA, verification, exceptions, and cycle metrics

A free, copy-ready vulnerability remediation runbook template. Twelve structured sections covering runbook header and version control, cycle activation criteria, roles for the cycle, intake and source mapping with deduplication and canonical-asset binding, triage and classification with severity reclassification and routing, ownership handoff to engineering with acknowledgement discipline, SLA windows and clock-start with defensible stop-the-clock conditions, fix verification protocol with paired retest, closure record discipline, exception escalation path with residual-band approver authority, cycle metrics and leadership readout, and runbook governance and review cadence. Aligned with ISO/IEC 27001 Annex A 8.8 and Clause 8.3, SOC 2 CC7.1 and CC7.2, PCI DSS Requirement 6.3 and 11.3, NIST SP 800-53 RA-5, SI-2, and CA-5, NIST SP 800-40 Rev. 4, CISA Binding Operational Directive 22-01, HIPAA 164.308(a)(1)(ii)(B), NIS2 Article 21, and DORA Article 9.

No credit card required. Free plan available forever.

Loading tool...

Run the runbook against the live findings ledger, not against a separate spreadsheet

SecPortal carries every cycle, every routed finding, every SLA pause, every paired retest, every closure record, and every exception entry on one workspace so the audit read of remediation performance and the operational read are the same record. Free plan available.

No credit card required. Free plan available forever.