Skip to content

Vulnerabilities

When Snyk has identified vulnerabilities in source code, it's time to decide what to do with them. This section will provide some expectations for how to resolve vulnerabilities in Equinor.

Looking for guidance on addressing vulnerabilities?

Guideline: Interpreting and prioritizing Snyk findings

Remediation

Ultimately it is up to each devOps team to decide how to remediate their vulnerabilities. However, for Equinor to have a total overview of the total security posture of the entire portfolio, we have expectations to how vulnerabilities should be evaluated once they are identified.

Snyk uses four severity levels: low, medium, high and critical to evaluate the risk of a particular vulnerability. The expected action depends on the severity of a given vulnerability.

Level Description
Critical This may allow attackers to access sensitive data and run code on your application
High This may allow attackers to access sensitive data in your application
Medium Under some conditions, this may allow attackers to access sensitive data on your application
Low Application may expose some data that allows vulnerability mapping, which can be used with other vulnerabilities to attack the application

Critical

Vulnerabilities should be evaluated and remediated as soon as possible. If a vulnerability is critical, there should be a plan for either fixing or removing the vulnerability, e.g. within 24 hours.

High

High vulnerabilities should be evaluated and remediated as soon as possible. If a vulnerability is high, there should be a plan for either fixing or removing the vulnerability, e.g. within 7 days.

Medium

Medium vulnerabilities should be evaluated and remediated. If a vulnerability is medium, there should be a plan for either fixing or removing the vulnerability, e.g. within 30 days.

Low

If a vulnerability is low, it should be evaluated to see if a fix is available.

Info

The timeframes above are not strict and each team needs to decide on their acceptable response times on Snyk issues.

Priority score

Snyk also provides a priority score from 0-1000 for each vulnerability. This score is based on the CVSS severity score, rechability of the vulnerability and the maturity of the exploit. The priority score is used to prioritize the work of the devOps teams. Note that the priority score may vary from project to project based on wether a fix is available or not.

Ignoring vulnerabilities

If the detected vulnerability is not applicable to your project, it can be ignored with a comment explaining why it should be ignored. There can be set a time period for how long an issue should be ignored. This can be handy when one wants to address the issue, but no immediate fix is available, the risk is acceptable and one wants to await the third party dependency to update things at their end.

If the vulnerability is in a project not in production it can be tagged with the lifecycle tag "sandbox" to exclude it from the aggregated dashboard.

Who to contact

Please reach out to the AppSec team on Slack or email at appsec[at]equinor.com if you have any questions regarding evaluating vulnerabilities.

Further resources