Zero-day and emergency vulnerability response
one engagement record from CVE drop to verified closure
A new critical CVE drops on a Friday afternoon. CISA adds a third-party library to the KEV catalog. A vendor publishes an emergency advisory with active exploitation in the wild. Internal security teams scramble to answer four questions in parallel: which assets are exposed, who owns the fix, what does proof of remediation look like, and how do we evidence the response to leadership and to the next audit. Most teams answer those questions through a hastily-created Slack channel, a shared spreadsheet, an email thread to engineering, and a war-room meeting that nobody minutes. Run zero-day and emergency vulnerability response as a structured engagement on the workspace instead, so the exposure assessment, the prioritised remediation, the verification, and the audit evidence land on one record from CVE drop to verified closure.
No credit card required. Free plan available forever.
Run zero-day and emergency vulnerability response on one engagement
A new critical CVE drops on a Friday afternoon. CISA adds a third-party library to the Known Exploited Vulnerabilities catalog. A vendor publishes an emergency advisory with active exploitation in the wild. Internal security teams scramble to answer four questions in parallel: which assets are exposed, who owns the fix, what does proof of remediation look like, and how do we evidence the response to leadership and to the next audit. Most teams answer those questions through a hastily-created Slack channel, a shared spreadsheet, an email thread to engineering, and a war-room meeting that nobody minutes. Three months later the auditor asks for the timeline and the reconstruction takes a week.
SecPortal models zero-day and emergency vulnerability response as a structured engagement on the workspace. The intake opens on the trigger event with the CVE identifier, the affected component, the upstream patch availability, the KEV and EPSS values, and the named on-call lead. Code scans, authenticated scans, and external scans surface every affected asset onto the engagement as findings. Prioritisation combines KEV plus EPSS plus CVSS plus asset criticality plus network exposure on each finding. Named owners take the response decision (patch, mitigation, exception, decommission) on each finding. The fix verification attaches to the same finding so closure is evidence. AI-assisted reporting drafts the leadership briefing and the customer-facing notification from the same structured engagement evidence. The audit trail reads from the engagement record.
Six trigger sources an emergency response engagement opens against
Emergency response is not the same workflow on every trigger. The intake captures the trigger source as a structured field so the programme can report on demand patterns, set source-specific SLAs, and budget the response load against the channels that actually carry the volume.
Critical CVE published with active-exploitation evidence
NVD or a vendor advisory publishes a critical CVE in a third-party library or product the company runs in the deployed estate. Active-exploitation evidence accompanies the publication: a working proof of concept, a public exploit, scanning activity observed in the wild, or in-the-wild compromise reports from incident-response firms. The publication is the start of the response clock, not the end of an awareness exercise.
CISA KEV catalog addition
CISA adds the CVE to the Known Exploited Vulnerabilities catalog. The KEV listing carries the federal civilian remediation date for federal agencies and serves as the de facto enterprise priority signal for everyone else. The KEV addition shortens the queue position on every asset that runs the affected component and triggers the emergency response engagement when the listing carries a 7-day remediation due date or a flag for ransomware campaign use.
Upstream vendor emergency advisory
A vendor in the supply chain publishes an emergency advisory: a software vendor patches a critical pre-authentication remote code execution, a cloud provider issues a service-side mitigation, an open source maintainer cuts an emergency release, or an OEM ships a firmware patch with active-exploitation evidence. The advisory comes with a fix and a window; the response engagement opens on the receipt of the advisory rather than on the morning standup.
Sector CSIRT or national CSIRT alert
A sector CSIRT (FS-ISAC, H-ISAC, electricity-ISAC, or similar) or a national CSIRT (CISA, NCSC, ENISA member, JPCERT) issues an alert that names the company sector or product class. The alert carries the indicators of compromise, the recommended actions, and the reporting obligations. The engagement captures the alert reference and the obligation deadline so the response is auditable rather than reconstructed from a security-team Slack thread.
Customer or partner escalation
A paying customer, a partner, or a downstream consumer escalates a third-party vulnerability that affects the company product or environment. The escalation may include the customer own remediation deadline, a contractual notification obligation, or a regulatory submission timeline. The engagement opens with the escalation reference, the customer contact, and the obligation deadline as structured fields rather than as the most-recent reply in the support inbox.
Internal threat-intelligence detection
The internal threat-intelligence function, the SOC, or a third-party feed surfaces an active campaign that targets a vulnerability the company estate is exposed to. The detection may pre-date the public CVE assignment, may carry incident-response context from another company in the same sector, or may surface from a paid threat-intelligence subscription. The engagement opens against the detection rather than waiting for the public confirmation.
Four exposure surfaces the engagement queries on day one
The exposure assessment runs against the surfaces SecPortal has visibility into. Each surface carries a different signal and a different latency. Running the four in parallel produces a defensible exposure picture inside the response window rather than across the next week.
Application source code
SecPortal runs Semgrep SCA against the lockfile and manifest of every connected GitHub, GitLab, and Bitbucket repository on every code scan. When the emergency engagement opens, an immediate code scan pass surfaces every direct and transitive dependency on the affected version range. Findings land on the engagement with the affected package, the version observed, the dependency path, the upstream fixed version, and the file location.
Running systems with authenticated visibility
Authenticated scans against verified domains run with stored AES-256-GCM-encrypted credentials so the scanner sees what an authenticated user sees. The authenticated pass catches the affected component on a running system where the version is observable through an admin endpoint, a status API, or a fingerprint banner that requires a session. Findings land on the engagement with the asset reference, the observed version, and the authentication context.
Internet-facing surface
External and continuous scans against verified domains catch the vulnerable component on an internet-facing surface where the version is visible without authentication: a public banner, a TLS handshake, a default error page, an HTTP header. The internet-facing exposure is the highest-priority sub-queue because the attack surface is observable to anyone with a port scanner.
Documented asset inventory references
Where the workspace carries asset references on prior engagements (the asset criticality scoring workflow, the asset-ownership mapping, the M&A due diligence record, the prior pentest engagement scope), the emergency engagement inherits the asset list and queries against it. The inherited asset references prevent the response from re-discovering the estate from scratch on every emergency. Note: SecPortal does not run a built-in asset inventory or CMDB sync; the asset references come from the engagements that have already captured them on the workspace.
Five prioritisation layers that turn the queue into a defensible ordering
A new emergency CVE looks the same on every asset until the prioritisation layer is applied. Five external and internal layers compose the queue ordering on each affected finding so the engineering team works the highest-risk asset first rather than the first-named asset.
| Prioritisation layer | What it commits the queue to |
|---|---|
| CISA KEV catalog listing | A KEV listing is a hard escalator. The CISA Known Exploited Vulnerabilities catalog carries the CVEs with confirmed in-the-wild exploitation. KEV-listed CVEs move to the front of the queue regardless of CVSS score. The KEV due date (where one is published) carries through to the engagement SLA so the response cadence reads against the federal civilian remediation timeline. |
| EPSS exploitation probability | The Exploit Prediction Scoring System publishes a daily probability that the CVE will be exploited in the next 30 days. EPSS sharpens the queue ordering for non-KEV CVEs by separating the CVEs with observed exploit code and active scanning from the CVEs with theoretical exploitability. A high EPSS score on a non-KEV CVE is the leading indicator that the next KEV addition is in the pipeline. |
| CVSS impact severity | CVSS 3.1 base score and vector quantify the impact severity (confidentiality, integrity, availability, attack complexity, attack vector, privileges required, user interaction, scope). CVSS alone is not enough to queue an emergency response (the wave of CVSS 9.8 CVEs without exploitation evidence is the symptom of a CVSS-only queue) but it sets the impact band the response decision sits inside. |
| Asset criticality and blast radius | The asset criticality on the engagement carries the business impact of an asset compromise. A crown-jewel asset with regulated data, customer-facing impact, or downstream supply-chain implications moves to the top of the sub-queue. A non-production sandbox moves to the bottom. The asset criticality scoring workflow on the workspace sets the baseline; the emergency engagement inherits it. |
| Network exposure of the affected asset | An internet-facing asset with the affected component exposed to anonymous traffic is in a different threat band than an internal asset reachable only from a corporate VPN. The network exposure layer separates the immediate-attack-surface findings from the lateral-movement findings so the response runs against the right threat band rather than against the longest list. |
Four response decisions every affected finding lands on
Each affected finding closes on one of four response decisions. The decision lands on the finding as a structured field with the named owner, the rationale, and the evidence artefact so the closure type is reportable across findings rather than reconstructed from free text.
Patch to the upstream fixed version
The default closure path. The named owner ships the upgrade to the fixed version on the affected asset. The activity log captures the commit reference, the deployment timestamp, and the verification scan that confirms the vulnerable component is no longer present.
Apply the vendor mitigation or workaround
Where the upstream fix is not yet available or the upgrade carries unacceptable change risk inside the response window, the named owner applies a documented vendor mitigation: a configuration change, a feature flag, a runtime control, or a network-level block. The mitigation lands on the finding with the rationale, the residual risk, and the planned date for the upgrade follow-up.
Accept residual risk through the exception register
Where the asset cannot be patched inside the response window (legacy environment, contractual change-freeze, vendor sunset), the residual risk is captured through the security exception register with a hard expiry, a compensating control, a named risk owner, and a named approver. The exception is a deliberate decision against the specific finding rather than a forwarded email.
Decommission the asset
Where the cost of the upgrade exceeds the benefit (an unused legacy service, a deprecated environment, a system already on the retire list), the response closes the finding by retiring the asset. The asset decommissioning workflow captures the cloud account closure, the DNS removal, the workload migration cutover, or the hardware decommissioning ticket so closure is evidence rather than assertion.
Where emergency responses usually go wrong
Six failure modes account for most emergency-response cycles that look operational but are actually the symptom of a missing single source of truth. Each one is silent during the response and loud at the post-mortem.
The exposure assessment never finishes
The response runs for two weeks and the team still cannot answer the simple question: how many assets are exposed. The code scan ran but only against the main repository; the authenticated scan was scoped to one verified domain; the asset list is on a wiki page nobody updates; the war-room channel has 600 messages and no consolidated count. Programmes that cannot answer the exposure question on day one cannot brief leadership, cannot prioritise the queue, and cannot prove closure at audit time.
The response starts before triage and races every CVE
The team treats the wave of newly-published critical CVEs as one undifferentiated emergency, races to patch the loudest first, and burns the engineering team on findings that are not reachable, not exploitable in the deployed environment, or already mitigated by an existing control. The KEV-EPSS-CVSS-asset-criticality layer is bypassed in the panic and the actual fire (the one CVE that is on KEV with a 7-day due date and an internet-facing crown jewel) waits in line behind a wave of unreachable mediums.
The fix lands without verification
Engineering merges the upgrade, the war-room channel celebrates, the named owner marks the finding closed, and the response engagement closes without a verification scan. Three weeks later the next scheduled scan reports the same CVE on the same asset because the deployment did not pick up the new lockfile, the runtime image was not rebuilt, or a transitive pin still pulls the vulnerable version. Closure on plan accumulates findings that pass the audit window and reopen at the next scan.
The audit trail is in a Slack channel that gets archived
The response runs through an impromptu Slack channel, the war-room minutes are bullet points in a doc nobody version-controls, the verification screenshots are attachments in DM threads, and three months later the auditor asks for the timeline of the response. The reconstruction takes a week and produces something that looks plausible rather than something that proves what actually happened. Audit-grade evidence has to land on a record while the response runs, not after.
Leadership gets four different status reads
The CISO updates the board from a deck the security-program-management lead built. The product VP updates the customer-facing teams from a memo the support lead drafted. The compliance team updates the audit committee from the spreadsheet the GRC lead maintains. The engineering lead updates the engineering org from the war-room channel. Four reports, four different numbers, no shared source. Leadership starts to mistrust the response because the numbers do not match.
The post-mortem never happens
The engagement closes when the patch lands, the team moves on to the next quarterly priority, and the lessons-learned never feeds the next response. The next emergency CVE inherits the same operational gaps: the same exposure-assessment lag, the same prioritisation mistakes, the same verification gap, the same audit-trail reconstruction. Programmes that close without a post-mortem stay at the same maturity tier across response cycles.
How the emergency response workflow looks in SecPortal
Emergency response is one workflow stitched into seven feature surfaces: the engagement record, findings management, code scanning, authenticated scanning, continuous monitoring, team management with role-based access, the activity log, AI-assisted reporting, and the branded client portal. The emergency engagement looks structurally similar to a pentest engagement, with the right intake and deliverable shapes for time-bounded third-party-vulnerability response work.
Structured emergency intake
The intake opens an emergency engagement under engagement management. The CVE identifier, affected component, upstream patch, KEV and EPSS values, and named on-call lead land as structured fields rather than as free text in a war-room channel.
Estate-wide exposure pass
Code scanning, authenticated scanning, and continuous monitoring run against the connected repositories and verified domains to surface every affected asset onto the engagement as a finding.
Triage and prioritisation
Apply CVSS, KEV, EPSS, and asset-criticality layers through findings management with the case status workflow (open, in_progress, resolved, verified, reopened) captured against each affected finding.
Named owners and watchers
Assign the named asset owner and the named approver through team management with role-based access. Watchers from incident response, communications, customer success, legal, and the leadership team join at the right access level.
Audit trail
The activity log retains the timestamped state changes (intake, exposure detection, triage decision, owner assignment, fix landing, verification scan, closure event) for the plan-defined window with CSV export for evidence binders.
Leadership and customer briefing
Draft the leadership status update and the customer-facing notification with AI report generation against the structured engagement evidence. Publish the customer-facing artefact through the branded client portal on the tenant subdomain.
Signals the emergency response engagement surfaces by default
When emergency responses run on engagements rather than on memory, five signals come straight off the record without a manual reporting pass. They drive the next investment decision (where the exposure-detection layer needs to extend), the next leadership read (whether the response cadence is meeting the bar), and the next post-mortem agenda.
Time-to-exposure-known by trigger source
The time from emergency trigger (CVE publication, KEV addition, vendor advisory, sector CSIRT alert) to the engagement holding a complete exposure picture across the estate. Sub-24-hour time-to-exposure-known is the operational baseline for KEV-listed CVEs; longer windows signal that the exposure-detection layer (code scans, authenticated scans, external scans, inherited asset references) is not aligned with the trigger sources the response actually opens against.
Time-to-prioritised-queue and prioritisation-mix
The time from exposure-known to the prioritised queue holding a defensible ordering across affected assets, plus the share of findings by prioritisation tier (KEV-listed crown-jewel internet-facing on top, CVSS-only non-reachable at the bottom). A queue dominated by undifferentiated "all critical" findings signals a prioritisation gap; a queue with a sharp top tier signals the KEV-EPSS-CVSS-asset-criticality layer is doing its job.
Time-to-verified-closure by severity tier
Median and 90th percentile time-to-verified-closure for KEV-listed, critical, high, and medium severity findings inside the engagement. The bands are observable against external SLA anchors (CISA BOD 22-01 for KEV-listed federal civilian estate, the published vulnerability SLA policy for the workspace) so SLA-breach risk surfaces before the SLA actually breaches.
Verification coverage on closed findings
The share of closed findings on the engagement that carry a verification scan as evidence of closure rather than a written assertion. Verification coverage below 100 percent on closed findings is the leading indicator that the next scheduled scan will reopen findings the response thought were done.
Exception expiry distribution and renewal rate
The number of findings closed via the exception register, the distribution of expiry windows, and the share of expiries that get renewed versus remediated. A high renewal rate signals the exception path is being used to defer the work rather than to capture genuine compensating-control situations. The signal feeds the next budget cycle and the next roadmap conversation.
Reviewer checklist before the engagement closes
Before the emergency engagement is marked closed and rolls into the post-mortem queue, the named on-call lead runs through a short checklist. Each line takes seconds; missing any one of them is the source of the failure modes above.
- The emergency response engagement opens on the trigger event (CVE publication, KEV addition, vendor advisory, CSIRT alert, customer escalation, internal threat-intelligence detection), not at the morning standup that mentioned it.
- The intake captures the CVE identifier, the affected component and version range, the upstream patch availability, the KEV listing and EPSS score, and the named on-call lead before the exposure assessment begins.
- Code scans against connected repositories, authenticated scans against verified domains, and external and continuous scans run against the estate to surface the exposure picture.
- Each affected asset lands as a finding on the engagement with the asset reference, the observed version, the scanner source, and the original timestamp.
- The prioritisation step combines KEV plus EPSS plus CVSS plus asset criticality plus network exposure to produce a defensible queue ordering on the engagement.
- The named owner is assigned through team management with role-based access on each affected finding and the response decision (patch, mitigation, exception, decommission) is captured as a structured field.
- Watchers from incident response, communications, customer success, legal, and the leadership team join the engagement at the right access level rather than receiving cross-channel updates.
- Fix tracking runs on the case status workflow (open, in_progress, resolved, verified, reopened) on each affected finding rather than as free text on the war-room channel.
- The verification scan attaches to each closed finding as a state event so closure is evidence rather than assertion.
- AI-assisted reporting drafts the leadership status update, the board briefing, and the customer-facing notification from the structured engagement evidence rather than from a manual reconciliation across four different reads.
- Customer-facing notifications publish through the branded client portal on the tenant subdomain so downstream stakeholders see the same source the engineering team verified the fix against.
- The activity log retains the timestamped state changes for the plan-defined window with CSV export so the audit answer comes from the engagement record rather than from a Slack archive search.
- The closed engagement feeds the post-mortem so the next response cycle inherits a sharper playbook, not the same operational gaps.
Where emergency response sits across the security programme
The emergency response engagement sits alongside the steady-state vulnerability lifecycle on the same engagement primitives. When the trigger lands, the engagement bypasses the steady-state cadence on the assets that need to move first; when the engagement closes, the affected assets fold back into the regular workflows.
Steady-state remediation
The steady-state remediation tracking and patch management coordination workflows cover planned cadence. Emergency response bypasses the cadence on the affected assets and folds them back in once the engagement closes.
Adjacent operational workflows
The incident response workflow covers confirmed compromises; PSIRT covers vendor-side product vulnerabilities. Emergency response sits between them, focused on the consumer-side third-party CVE.
Prioritisation and exception
The vulnerability prioritisation workflow holds the queue model the emergency engagement applies on each finding. Exceptions land in the vulnerability acceptance and exception management workflow with hard expiry and named approver.
Audit and leadership reporting
The engagement carries the audit trail that audit evidence retention depends on, and the metrics that security leadership reporting reads from. ISO 27001 Annex A 8.8, SOC 2 CC7.1, PCI DSS 6.3 and 11.3, and CISA BOD 22-01 questions answer from the engagement record.
Pair the workflow with the long-form guides
Emergency response operations sit alongside the rest of the vulnerability lifecycle. Pair this workflow with the CISA KEV catalog vulnerability management guide for the KEV signal the engagement opens against, the EPSS score explainer for the exploitation-probability layer the prioritisation reads, the CVSS scoring guide for the impact-severity vocabulary, the vulnerability prioritisation framework for the layered queue the response engagement applies, the SSVC explainer for the action-band layer some teams pair with KEV-EPSS-CVSS, and the incident response plan guide for the adjacent SOC-side operating model the engagement may hand off to when exposure produces confirmed compromise.
Buyer and operator pairing
A structured emergency response workflow is the operating model internal security teams, vulnerability management teams, AppSec teams, security operations leaders, and CISOs rely on when a third-party CVE drops with active-exploitation evidence. The framework references that shape the emergency response cadence include CTEM for the continuous-exposure-management operating model the response sits inside, ISO 27001 Annex A 8.8 for the documented vulnerability handling procedure, and NIST CSF 2.0 for the Identify-Protect-Detect-Respond-Recover-Govern model the emergency engagement surfaces evidence against.
What good emergency response delivery feels like
One source of truth from trigger to closure
Leadership, engineering, GRC, customer success, and legal all read the same numbers because they read from the same engagement record. The exposure count, the verified-closed count, the open count, and the residual-risk count match across every briefing.
Audit trail across the lifecycle
Named on-call lead, named asset owners, named approver on exception decisions, trigger event reference, exposure timestamps, prioritisation rationale, response decision per finding, verification scan evidence, and closure timeline all live on the engagement. ISO 27001, SOC 2, PCI DSS, and CISA BOD 22-01 audit answers come from one source.
Closure on evidence rather than assertion
Every closed finding carries a verification scan, a documented exception with hard expiry and named approver, or an asset retirement record as evidence. The next scheduled scan does not reopen findings the response thought were done.
Post-mortem on real signals
The closed engagement feeds the post-mortem with the time-to-exposure-known distribution, the time-to-verified-closure distribution, the verification coverage, and the exception expiry distribution. The next emergency CVE inherits a sharper playbook.
Scope and limitations
SecPortal models the emergency response engagement as a structured workspace engagement, the exposure assessment as findings produced by code scanning, authenticated scanning, external scanning, and continuous monitoring, the prioritisation as named-triager decisions on each finding, the response decision as a structured field on each finding, the verification as a follow-up scan attached to the same finding, the leadership briefing as an AI-assisted draft against the structured engagement evidence, the customer notification as a published artefact through the branded client portal on the tenant subdomain, and the audit trail as the activity log with CSV export. SecPortal does not run a built-in asset inventory or CMDB sync, an EDR fleet query, a SIEM integration, a SOAR playbook engine, a Jira or ServiceNow ticket synchronisation, an automated patch deployment system, an automated KEV or EPSS feed fetch on the customer behalf, an email notification platform, a regulator submission portal, or a dedicated war-room communication channel. Where the response touches surfaces outside the platform visibility (a third-party SaaS without a connector, a partner-owned system, a regulator submission through an external portal), the engagement captures the reference and the action as structured findings rather than treating the gap as silent. Customer-facing notifications through external channels remain the company own action; the platform provides the reproducible source the external publication reads from.
Frequently asked questions about zero-day and emergency vulnerability response
How is zero-day and emergency vulnerability response different from PSIRT?
PSIRT (Product Security Incident Response Team) handles vulnerabilities in the products the company ships to customers; the case ends in a published security advisory, a CVE identifier on the company products, and a coordinated notification to downstream consumers. Zero-day and emergency vulnerability response handles the consumer side of the same lifecycle: a CVE in a third-party component the company runs, an estate-wide exposure assessment, a prioritised remediation across owned assets, and an internal verification of closure. PSIRT is the vendor-side workflow when the company is the affected vendor; emergency response is the buyer-side workflow when the company is the affected consumer. The two run in parallel against the same engagement primitives but answer to different inputs and produce different outputs.
How is this different from the generic incident response use case?
The generic incident response workflow covers the full SOC operating model around a confirmed security incident: detect, contain, eradicate, recover, and learn. Zero-day and emergency vulnerability response covers the upstream layer: a vulnerability with active exploitation potential lands and the question is whether the company estate is exposed, who owns the fix, and how the response is evidenced. Sometimes the two workflows merge (when a zero-day exploitation produces a confirmed compromise the company has to handle as an incident); most of the time they sit alongside each other on the same engagement primitives.
How is this different from the patch management coordination use case?
The patch management coordination workflow covers steady-state patching: the planned cadence, the maintenance window, the regression-test cycle, and the production-rollout governance. Zero-day and emergency vulnerability response covers the out-of-cycle scenario where the patch landed yesterday, the exploitation evidence is in the wild today, and the regular patch cadence is not fast enough. The two workflows share the engineering owners, the affected assets, and the verification scans, but the emergency engagement bypasses the steady-state cadence on the assets that need to move first.
Can SecPortal find every asset that runs the affected component?
SecPortal runs the exposure assessment against the surfaces it has visibility into: code scans against connected GitHub, GitLab, and Bitbucket repositories (Semgrep SCA across direct and transitive dependencies), authenticated scans against verified domains with stored AES-256-GCM-encrypted credentials, external and continuous scans against verified domains, and asset references inherited from prior engagements on the workspace. SecPortal does not run a built-in asset inventory, a CMDB sync, an EDR fleet query, or a SIEM integration that would resolve every asset in the estate. Where the estate carries assets outside the platform visibility (a third-party SaaS the company runs without a connector, an on-premises system not added to verified domains, a partner-owned system referenced by an SLA), the response engagement captures the asset reference and the manual exposure check as structured findings rather than treating the gap as silent.
How does SecPortal use KEV, EPSS, and CVSS in the prioritisation?
SecPortal carries the CVSS 3.1 vector parsing on findings management as a structured field, so the impact severity reads off the engagement record. The CISA KEV catalog and the EPSS exploitation-probability layer are external references the response engagement cites in the prioritisation rationale; the KEV listing date and the EPSS score land on the finding as structured fields the named triager records. The platform does not auto-fetch the KEV feed or the EPSS feed on the customer behalf; the response engagement captures the values the team reads from the source feeds. The prioritisation decision (KEV-listed crown-jewel internet-facing on top, CVSS-only non-reachable at the bottom) is a deliberate named-triager action against each finding rather than an algorithmic ordering the platform produces unilaterally.
Can the platform notify downstream consumers automatically?
No. The customer-facing notification artefact (the email, the customer-portal post, the regulator submission, the contractual disclosure) is drafted with AI-assisted reporting against the structured engagement evidence and published through the branded client portal on the tenant subdomain so the downstream stakeholders see the same source. SecPortal does not run a public mailing list, a customer notification platform, an email blast service, or a regulator submission portal on the company behalf. The customer-facing artefact remains the company own action through the relevant external channel; the platform provides the reproducible source that artefact reads from.
How does this support audit and regulatory obligations?
The emergency response engagement carries the named on-call lead, the named asset owners, the named approver on exception decisions, the trigger event reference, the exposure assessment timestamps, the prioritisation rationale, the response decision per finding, the verification scan evidence, and the closure timeline as structured fields on the activity log. ISO 27001 Annex A 8.8 (technical vulnerability management), SOC 2 CC7.1 and CC7.2, PCI DSS Requirements 6.3 and 11.3, NIST SP 800-53 RA-5 and SI-2, and CISA BOD 22-01 audit questions answer from the engagement record rather than from a reconstruction of Slack threads and meeting notes. The activity log retains the timestamped state changes for the plan-defined window with CSV export for evidence binders.
When does a zero-day response engagement close?
When every confirmed exposure on the engagement is verified remediated through a follow-up scan, accepted with a documented residual risk through the exception register, or retired through the asset decommissioning workflow. Closure on plan does not satisfy the rule; only closure on evidence of verified remediation, named-approver exception sign-off, or asset retirement. Findings that did not survive the verification scan stay open with the reopen reason captured so the next response cycle starts from the same record. The engagement carries a closing post-mortem note that feeds the programme review.
How it works in SecPortal
A streamlined workflow from start to finish.
Open the emergency response engagement and capture the trigger
Open a dedicated engagement against the workspace as soon as the trigger arrives, whether that is a CVE published with active-exploitation evidence, a CISA KEV catalog addition, an upstream vendor emergency advisory, a cyber alert from a sector CSIRT, or a customer escalation about a third-party library in the deployed estate. Capture the CVE identifier, the affected component and version range, the public proof-of-concept link if one exists, the upstream patch availability, the KEV listing date, the EPSS score, and the named on-call lead at intake. The engagement replaces the impromptu Slack channel as the single source of truth.
Assess exposure across the estate with code scans, authenticated scans, and asset queries
Run an immediate exposure pass to find every asset that carries the affected component. SecPortal code scans (Semgrep SCA against connected GitHub, GitLab, and Bitbucket repositories) catch the vulnerable package across application source. Authenticated scans against verified domains catch the vulnerable component on running systems where the fingerprint is observable. External and continuous scans surface internet-facing exposure where the affected version banner is visible. Each detection lands on the engagement as a finding with the asset reference, the version observation, the scanner source, and the original timestamp so the exposure picture is reconstructible at audit time rather than reassembled from memory.
Prioritise the queue with KEV, EPSS, CVSS, and asset criticality
A new emergency CVE looks the same on every asset until it is prioritised. The triage step combines the KEV listing as a hard escalator, EPSS as the exploitation-probability layer, CVSS as the impact severity, the asset criticality on the engagement for blast radius, and the network exposure of the asset to derive a defensible ordering. The internet-facing crown-jewel asset moves to the top of the queue; the air-gapped non-production environment moves to the bottom. The ordering lands on each finding with the named triager and the rationale so the queue reads as a defensible decision rather than as alphabetical asset names.
Assign named owners and capture the response decision per asset
Route each affected asset to the named owner through team management with role-based access. The response decision lands on the finding as a structured field: patch the upstream library, deploy the vendor mitigation, apply the documented workaround, accept the residual risk through the exception register with a hard expiry, or decommission the asset where the fix cost exceeds the benefit. Watchers from incident response, communications, customer success, legal, and the leadership team join the engagement at the right access level so the war-room cadence reads off one record rather than from cross-channel updates.
Drive the fix, verify it with a follow-up scan, and capture proof of remediation
Track the engineering work on each finding against the case status workflow (open, in_progress, resolved, verified, reopened). When the patch lands, a follow-up code scan, authenticated scan, or external scan re-runs against the affected asset to confirm the vulnerable component is no longer present. The verification scan attaches to the same finding as a state event so closure becomes evidence rather than assertion. Findings that did not survive the verification scan (the patch was reverted, the rebuild was missed, a transitive pin still pulls the vulnerable version) stay open with the reopen reason captured so the next response cycle starts from the same record rather than from scratch.
Brief leadership and downstream stakeholders from the engagement record
Leadership wants the same answer the engineering team produces: how many assets were exposed, how many are remediated, how many remain open, what the residual risk looks like, and when the all-clear lands. Use AI-assisted reporting against the structured engagement evidence to draft an executive summary, a status update for the board or audit committee, and a customer-facing notification where the response affects downstream consumers. Publish the customer-facing artefact through the branded client portal on the tenant subdomain so the downstream stakeholders see the same source the engineering team verified the fix against.
Close the engagement, retain the audit trail, and feed the next post-mortem
Mark the engagement closed once every confirmed exposure is verified remediated, accepted with documented residual risk, or retired with the asset. The activity log retains the timestamped state changes (intake, exposure detection, triage decision, owner assignment, fix landing, verification scan, closure event) for the plan-defined window with CSV export. The closed engagement feeds the post-mortem so the programme learns: which inbound channels caught the trigger first, where exposure detection lagged, which assets had the slowest fix path, and which response decisions held up at closure. The next emergency CVE inherits a sharper playbook because the last one closed on evidence.
Features that power this workflow
Orchestrate every security engagement from start to finish
Vulnerability management software that tracks every finding
Find vulnerabilities before they ship
Test web apps behind the login
Monitor continuously catch regressions early
Every action recorded across the workspace
Collaborate across your entire team
AI-powered reports in seconds, not days
Compliance tracking without a full GRC platform
Your brand. Your portal. Your clients love it.
Run zero-day and emergency vulnerability response on one record
Open the engagement at trigger, scan the estate for exposure, prioritise with KEV plus EPSS plus CVSS plus asset criticality, assign named owners, verify each closure with a re-scan, and brief leadership from the same record. Start free.
No credit card required. Free plan available forever.