From 8 000 “Criticals” to Fewer Than 200: Five Years of Pathway-Aware Risk Prioritisation in Enterprise Vulnerability Management

dc.contributor.authorNsiangani, Kibavuidi
dc.contributor.authorIpoli, Christian
dc.date.accessioned2025-11-25T12:24:14Z
dc.date.issued2025-11-20
dc.description.abstractSecurity operations teams are overwhelmed by alerts and routinely wrestle with backlogs of several thousand “critical” vulnerabilities, yet still experience serious incidents and rising analyst burnout. During the first years of the COVID-19 pandemic this became particularly visible: attack surfaces expanded overnight through remote access, while staffing levels and attention were under pressure. This article describes five years of experience with a pathway-oriented, open-standard risk prioritisation model deployed in several Tier-1 European organisations in financial and automotive sectors. Instead of relying primarily on scanner-provided severity (for example CVSS-based critical/high/medium/low buckets), the model ranks issues according to their role in concrete attacker pathways: how they enable entry, lateral movement and impact on critical assets. Our research offers three main contributions. First, we detail a natural experiment during the first COVID-19 wave where an automotive finance subsidiary, using shared infrastructure, reduced over 6,000 scanner-critical items on its remote-access estate to zero pathway-critical issues in under six months. This occurred despite increased remote-work exposure and attack volume, and without successful compromise, unlike branches on the same infrastructure using traditional CVSS prioritization, which suffered incidents. Second, we generalize this, showing five large organizations reduced top-priority items by over 90% (from ~8,000 to <200) without compromising security outcomes. Third, these reductions were achieved within formal governance frameworks (documented plans and architectures) that have since been formalized into open, vendor-neutral standards now being reused in Europe and African/EMEA markets.
dc.description.provenanceSubmitted by Kibavuidi Nsiangani (k.nsiangani@cena.institute) on 2025-11-25T12:24:14Z No. of bitstreams: 2 downloadfile-1.pdf: 1137622 bytes, checksum: 2e9c495632862e87fa1646ef60ba563d (MD5) license_rdf: 905 bytes, checksum: 2f656a26de8af8c32aaacd5e2a33538c (MD5)en
dc.description.provenanceMade available in DSpace on 2025-11-25T12:24:14Z (GMT). No. of bitstreams: 2 downloadfile-1.pdf: 1137622 bytes, checksum: 2e9c495632862e87fa1646ef60ba563d (MD5) license_rdf: 905 bytes, checksum: 2f656a26de8af8c32aaacd5e2a33538c (MD5) Previous issue date: 2025-11-20en
dc.identifier.citationNsiangani, K; Ipoli, C; in RAEST – Journal d'élite de la Recheche Epistemologique, Scientifique Transdisciplinaire, CEMA-USK, 2025
dc.identifier.other10.5281/zenodo.17710860
dc.identifier.urihttps://africarxiv.ubuntunet.net/handle/1/10596
dc.language.isoen
dc.publisherCEMA-USK
dc.relation.ispartofseries29; 1b
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 United Statesen
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/3.0/us/
dc.titleFrom 8 000 “Criticals” to Fewer Than 200: Five Years of Pathway-Aware Risk Prioritisation in Enterprise Vulnerability Management
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
downloadfile-1.pdf
Size:
1.08 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.22 KB
Format:
Item-specific license agreed to upon submission
Description:

Collections