Ask HN: How much do you care about CVE in your team?

4 pointsposted 10 months ago
by megamix

Item id: 43480022

5 Comments

awaythrow999

10 months ago

We do have tools in every step of the sdlc so we can find issues as early as possible. Anything that is exploitable and left unmatched is a compliance violation so we take it very seriously. That said, exploitability is very (expensive) hard to proof, so in practice we try to mitigate via upgrading instead of long pointless discussions about risk. The second thing this forces us, is to look at complexity and tech-debt in a new light.

megamix

10 months ago

And in what industry/sector (possibly markets) are you mainly operating in ?

nextts

10 months ago

Yes get chased up about it by security teams. Internal or external apps.

2rsf

10 months ago

It's mandatory as part of the SDLC and support by appropriate tooling, unfixed higher level vulnerabilities are periodically tracked by middle-upper management

comprev

10 months ago

Tools in the pipelines detect and report on CVEs found.

We block high/critical by default and the rest are given a deadline to be resolved in agreement with security.