Vulnerabilities¶
When Snyk has identified vulnerabilities in source code, it's time to decide what to do with them. This section will provide some expectations for how to resolve vulnerabilities in Equinor.
Looking for guidance on addressing vulnerabilities?
Remediation¶
Ultimately it is up to each devOps team to decide how to remediate their vulnerabilities. However, for Equinor to have a total overview of the total security posture of the entire portfolio, we have expectations to how vulnerabilities should be evaluated once they are identified.
Snyk uses four severity levels: low, medium, high and critical to evaluate the risk of a particular vulnerability. The expected action depends on the severity of a given vulnerability.
Level | Description |
---|---|
Critical | This may allow attackers to access sensitive data and run code on your application |
High | This may allow attackers to access sensitive data in your application |
Medium | Under some conditions, this may allow attackers to access sensitive data on your application |
Low | Application may expose some data that allows vulnerability mapping, which can be used with other vulnerabilities to attack the application |
Critical¶
Vulnerabilities should be evaluated and remediated as soon as possible. If a vulnerability is critical, there should be a plan for either fixing or removing the vulnerability, e.g. within 24 hours.
High¶
High vulnerabilities should be evaluated and remediated as soon as possible. If a vulnerability is high, there should be a plan for either fixing or removing the vulnerability, e.g. within 7 days.
Medium¶
Medium vulnerabilities should be evaluated and remediated. If a vulnerability is medium, there should be a plan for either fixing or removing the vulnerability, e.g. within 30 days.
Low¶
If a vulnerability is low, it should be evaluated to see if a fix is available.
Info
The timeframes above are not strict and each team needs to decide on their acceptable response times on Snyk issues.
Priority score¶
Snyk also provides a priority score from 0-1000 for each vulnerability. This score is based on the CVSS severity score, rechability of the vulnerability and the maturity of the exploit. The priority score is used to prioritize the work of the devOps teams. Note that the priority score may vary from project to project based on wether a fix is available or not.
Ignoring vulnerabilities¶
If the detected vulnerability is not applicable to your project, it can be ignored with a comment explaining why it should be ignored. There can be set a time period for how long an issue should be ignored. This can be handy when one wants to address the issue, but no immediate fix is available, the risk is acceptable and one wants to await the third party dependency to update things at their end.
If the vulnerability is in a project not in production it can be tagged with the lifecycle tag "sandbox" to exclude it from the aggregated dashboard.
Who to contact¶
Please reach out to the AppSec team on Slack or email at appsec[at]equinor.com
if you have any questions regarding evaluating vulnerabilities.