Patch Actively Exploited Critical Vulnerabilities within 30 Days
Description
Actively exploited critical vulnerabilities patched within 30 Days
Dashboard Inclusion
We use the column has_patchCriticalVulns30Days_policy
from the table projects
to calculate the status, this column is populated using the bulk importer. More information
Details
- Default Category: vulnerability management
- Default Priority Group: P5
- Implementation Details: It is manual (details).
- C-SCRM: false
- Sources: OpenSSF Best Practices Badge Passing Level (vulnerabilities_critical_fixed)
- Sources: Google Project Zero Vulnerability Disclosure Policy