On this page
Vulnerability Exposure Prioritization
Overview
Prioritize vulnerabilities based on real exposure, network context, and business impact to focus remediation efforts where it matters most.
To prioritize vulnerability remediation effectively, you need to understand which vulnerabilities create real exposure in your environment—not just which ones have the highest severity.
Vulnerability Exposure Prioritization guides you through using Vulnerability Mitigation Application extension to:
-
Correlate vulnerability findings with network context to identify exposed assets.
-
Focus analysis on the critical zones and untrusted networks you define.
-
Connect exposure to the specific assets and firewall rules that enable access.
Why this matters
Scanner results alone don’t show what is actually reachable or most urgent to address.
Exposure-based prioritization gives you practical focus and defensible decisions, helping you:
-
Identify vulnerabilities that create real exposure from untrusted networks or within critical zones.
-
Reduce remediation noise by focusing on the assets and rules that drive exposure.
-
Prioritize mitigation actions that measurably reduce risk, and track progress through tickets and reports.
Who this is for
-
SOC analysts responsible for monitoring exposure dashboards and alerts.
-
Risk managers responsible for correlating vulnerabilities with policy data.
-
Policy owners responsible for connecting remediation with policy controls.
Key capabilities
Vulnerability Exposure Prioritization leverages key features for :
-
Vulnerability Mitigation Application (VMA) extension to your identify and mitigate network exposure to vulnerabilities.
-
SecureChange Workflows to decommission servers and modify servers and rules.
-
TufinMate for SOC for conversational access to Tufin network-policy context.
Prerequisites
- VMA application installed.
-
Zones configured in SecureTrack to match your organizational structure.
-
TufinMate for SOC installed and integrated.
Step 1: Configure VMA settings
Before you use the VMA application, configure and verify the required settings to ensure that integrations with external scanning systems work correctly and exposure analysis is accurate.
-
Use VMA's Settings to verify and complete configuration.
Integrate vulnerability scanners
To keep VMA up to date on asset vulnerability status, connect one or more external vulnerability scanners or vulnerability management systems (VMS) that scan your network assets.
Select the VMS vendor logo and configure the required connection settings so VMA can retrieve findings on a recurring basis.
See Connecting to an external VMS.
Define internet and untrusted networks
For VMA to identify external exposure paths, define the IP ranges that represent internet-based or untrusted network sources.
If VMA determines that vulnerable services are reachable from untrusted networks, it marks affected assets as Exposed.
See Identifying assets from untrusted networks.
Define critical zones
Select the network zones where you want VMA to focus exposure analysis (for example, DMZ and other high-risk zones). This prioritizes the areas you care about and improves efficiency by limiting correlation to the zones you select rather than analyzing the entire network.
You must select at least one network zone.
Configure SecureChange workflows
If you are a SecureChange+ customer, and your deployment supports remediation workflows, select the SecureChange workflows VMA uses to open mitigation requests for exposed assets and rules. This enables you to move from analysis to controlled remediation with approvals and tracking.
You also need to define the connection credentials.
-
Modify Group
The SecureChange workflow to request changes to a group that contains assets to block or remove.
-
Server Access Decommission (for ST+ customers)
The SecureChange workflow to open server decommission requests for assets.
-
Rule Modification
The SecureChange workflow to open modification requests for rules.
Configure email notifications
Configure email notifications to define who receives the vulnerability summary report.
Notifications ensure timely reviews and follow-up.
See Configuring email notifications.
Step 2: Set up sync with integrated scanners
After integrating external scanners, for VMA to regularly retrieve and refresh vulnerability findings for your assets, configure data synchronization. You can run the sync manually or schedule automatic syncs to keep exposure analysis current.
Use VMA's Sync page to configure and run syncs.
See Scheduling data synchronization.
Step 3: Analyze network vulnerability exposure
Get a high-level view of vulnerability exposure across your defined scope in the Home dashboard. This view helps quickly identify where exposure concentrates and where to start investigation.
Use VMA's Home dashboard to drill down from summary views to asset-level exposure details.
See Analyzing network vulnerability.
Step 4: Analyze exposed assets
Review exposed assets to understand what is vulnerable, why it is exposed, and what action is appropriate. This step helps you decide whether to remediate through patching or to mitigate exposure through access reduction or decommission by opening tickets in SecureChange.
Use VMA's Assets to:
-
Review exposure status and vulnerability findings per asset.
-
Prioritize remediation (patch/upgrade) versus mitigation (restrict access or decommission).
See:
Opening Group Modification tickets in SecureChange
Step 5: Analyze firewall rules linked to exposed assets
In addition to asset analysis, review the firewall rules that allow access to vulnerable services. VMA correlates rules to vulnerabilities based on the vulnerability’s service and the rule’s source/destination. Only rules that match the source or destination and one of the vulnerable services are correlated.
Use VMA's Rules to:
-
Identify which rules contribute to exposure for affected assets.
-
Prioritize rule changes that reduce reachability to vulnerable services.
See:
Opening a Rule Modification ticket in SecureChange
Step 6: Review identified CVEs
Review the CVEs (vulnerabilities) VMA identifies for scanned rules and devices to understand which vulnerabilities drive exposure and decide what action to take for the affected assets and rules.
Use VMA's Vuln (Vulnerability) to:
-
Triage by severity and relevance to focus on the CVEs that contribute most to exposure.
-
Review vendor-provided details on the CVE.
-
Identify affected network zones, assets, and rules linked to each CVE.
See Reviewing rule and device vulnerabilities.
Step 7: Analyze zones and identify servers for decommission
Review exposure by the critical zones configured to understand where exposed assets concentrate in the areas you prioritized, and supports targeted remediation and mitigation decisions.
Use VMA's Zones to:
-
Review exposure status and vulnerability findings for assets in each critical zone.
-
Identify exposed assets in prioritized zones that require remediation or mitigation.
-
Optionally initiate decommission workflows for assets that should be removed from service.
See:
Server Decommission tickets in SecureChange
Step 8: Track mitigation tickets
After you open mitigation tickets in SecureChange, track progress from within VMA to confirm whether exposed assets and rules are being addressed and understand the current status of each request.
Use VMA's Tickets to monitor ticket status through completion.
See Tracking mitigation tickets.
Step 9: Generate reports
Generate reports to share exposure and vulnerability findings for review and auditing.
Use VMA's Reports for overall network vulnerability status or a zone-by-zone breakdown based on data correlated from your integrated VMS systems.
See Creating reports.
Step 10: Use TufinMate for SOC
TufinMate is a Security Copilot plugin that pulls information from the Tufin Orchestration Suite (TOS), and returns details such as permitted network access paths, firewall rule compliance, rule permissiveness, and last hit data—so analysts can quickly understand how traffic is allowed to traverse the network.
Use TufinMate in Microsoft Security Copilot to give SOC analysts fast, conversational access to Tufin network-policy context while they triage exposure.
-
Speed triage: Ask Copilot questions and immediately get policy/path context that helps explain whether a vulnerable asset/service is reachable in the network.
-
Connect exposure to enforcement: Link findings to the network controls that permit access (paths and rule posture), and help teams decide where to mitigate (policy/rule changes) versus remediate (patching).
-
Reduce time to action: Reduce incident response time by giving analysts the context they need without switching tools.
See TufinMate.
Was this helpful?
Thank you!
We’d love your feedback
We really appreciate your feedback
Send this page to a colleague