Library Vulnerability Update Policy Guide - Designing Severity-Based SLAs from Global Standards

Tadashi Shigeoka ·  Thu, January 29, 2026

“How many days should we allow to patch a library vulnerability?” — no single authoritative standard provides a universal answer. NIST says “within an organization-defined time period,” ISO 27001 calls for “appropriate and timely action,” and most other frameworks use similarly qualitative language.

Yet concrete, severity-based deadlines do exist.

FrameworkKey Deadlines
CISA BOD 19-02Critical 15 calendar days / High 30 calendar days
FedRAMPCritical/High 30 days / Moderate 90 days / Low 180 days
PCI DSSCritical 30 days
UK SS-033Critical 7 days (conditional) / High 14 days / Medium & Low 45 days
AUS ASDActive exploit 48 hours / Others 2 weeks

By combining these anchor points, organizations can build well-grounded patching SLAs.

This article surveys major global and Japanese standards at the primary-source level and presents a unified SLA that any organization can adapt.

What “Severity” Actually Means — Positioning CVSS

Before designing severity-based SLAs, let’s clarify the CVSS classification we’ll use as our baseline.

SeverityCVSS v3.1 ScoreResponse Direction
Critical9.0–10.0Top priority. Easy to exploit remotely with catastrophic impact
High7.0–8.9Rapid response needed. Serious impact but more complex attack conditions
Medium4.0–6.9Address within regular update cycles
Low0.1–3.9Address during planned maintenance

However, CVSS measures severity, not risk. A Medium-scoring vulnerability with confirmed active exploitation should be treated as Critical. Our SLA design therefore always factors in:

  • Exploitability: Active exploitation (in-the-wild), KEV catalog listing
  • Asset exposure: Internet-facing vs. internal systems
  • Mitigations available: Whether WAF rules, network segmentation, or other compensating controls are feasible

The Three Global Frameworks with Hard Deadlines

Among the world’s many security frameworks, only a handful prescribe binding, severity-based remediation timelines.

CISA Binding Operational Directives (United States)

CISA enforces the most aggressive timelines through two complementary directives.

BOD 19-02 (2019) mandates that internet-facing federal systems remediate Critical vulnerabilities within 15 days and High vulnerabilities within 30 days.

BOD 22-01 (2021) shifts focus from CVSS scores to Known Exploited Vulnerabilities (KEV), assigning per-CVE deadlines: two weeks for CVEs assigned in 2021 or later, and six months for older CVEs. CISA’s analysis shows that 42% of exploited CVEs are weaponized on day zero, and 75% within 28 days.

FedRAMP (United States)

FedRAMP fills in the blank parameters that NIST SP 800-53 deliberately leaves to organizations, creating the most comprehensive severity-tiered framework currently in effect.

SeverityRemediation Deadline
Critical / High30 days
Moderate90 days
Low180 days

These 30/90/180-day timelines have become the de facto industry benchmark, referenced even by organizations with no FedRAMP obligation.

PCI DSS v4.0.1 (International)

PCI DSS v4.0.1 (June 2024), Requirement 6.3.3, mandates that critical security patches be installed within 30 days of release. For High and below, the timeline is “as determined by the entity.”

Notably, PCI DSS v4.0 had proposed a 30-day requirement for both Critical and High patches, but v4.0.1 narrowed this back to Critical only — an intentional design choice to preserve risk-based judgment for organizations.

Framework-Based Standards — No Numbers, But Process Requirements

Most major standards avoid prescribing specific day counts, instead requiring organizations to define and operate their own SLAs.

NIST SP 800-53 Rev 5 / SP 800-40r4

NIST SP 800-53’s SI-2 (Flaw Remediation) requires security updates “within [Assignment: organization-defined time period].” The commonly cited “30/90/180 days” actually originates from FedRAMP’s parameterization, not from NIST itself.

SP 800-40r4 (2022) frames patching as “preventive maintenance” and broadly scopes its guidance to all software and firmware, making it directly applicable to dependency management.

ISO/IEC 27001:2022 / 27002:2022

ISO 27002:2022 Control 8.8 (Management of Technical Vulnerabilities) requires “appropriate and timely action” but prescribes no numerical deadlines whatsoever. Certification audits evaluate whether a functioning process exists, not whether specific day counts are met. The “48-hour Critical” figure sometimes cited by auditors has no basis in the standard text.

SOC 2 (AICPA Trust Services Criteria)

SOC 2’s CC7.1 requires vulnerability scans “on a periodic basis” with remediation “on a timely basis.” As a principles-based framework, auditors evaluate whether controls operate effectively as designed — not against specific timelines.

CIS Controls v8.1

CIS Controls take a uniform approach: automated patch management running monthly or more frequently, with no severity differentiation.

Additional Standards with Concrete Timelines

Beyond the big three, two government standards provide particularly useful severity-tiered benchmarks.

UK Security Standard SS-033 (2024)

The UK Department for Work & Pensions’ SS-033 is one of the most directly actionable primary sources for severity-based SLAs:

SeverityDeadlineException Review
Critical (conditions met; otherwise 14 days)7 days
High14 days
Medium45 days
Low45 days3 months maximum for risk acceptance

Australian ASD/ACSC Patching Guidance (2023)

Australia’s Signals Directorate recommends patching internet-facing services within two weeks, tightening to within 48 hours when the vendor rates the vulnerability as Critical or when working exploits exist.

Cross-Reference Comparison Table

FrameworkCriticalHighMediumLowBinding?
CISA BOD 19-0215 days30 daysMandatory (federal)
CISA BOD 22-01 (KEV)Per-CVE (2 weeks / 6 months for older CVEs)SameSameSameMandatory (federal)
FedRAMP Rev530 days (same as High)30 days90 days (Moderate)180 daysMandatory (CSPs)
PCI DSS v4.0.130 daysEntity-definedEntity-definedEntity-definedMandatory (cardholder data)
CIS Controls v8.130 days (uniform)30 days30 days30 daysVoluntary
NIST SP 800-53Org-definedOrg-definedOrg-definedOrg-definedMandatory (federal)
ISO 27001/27002Not specifiedNot specifiedNot specifiedNot specifiedFor certification
SOC 2Not specifiedNot specifiedNot specifiedNot specifiedFor attestation
UK SS-0337 days (conditional, else 14)14 days45 days45 daysMandatory (scope)
AUS ASD/ACSC48 hours (exploit)2 weeks2 weeks2 weeksRecommended

Unified SLA Design — Building an Operationally Practical Policy

Synthesizing the above, here is a unified SLA suitable for most organizations. It uses the UK SS-033 (7/14/45 days), Australian ASD (48 hours), and IPA (triage/permanent two-phase model) as external benchmarks while satisfying the process requirements of NIST, SOC 2, and ISMS.

Severity (CVSS)Triage StartInterim MitigationPermanent Fix (Patch)Notes
Critical (9.0–10.0)Same day48 hours7 days (14 days max)Shortest timeline for internet-facing + exploit confirmed
High (7.0–8.9)1 business dayAs needed14 daysEscalate to Critical if easily exploitable + high exposure
Medium (4.0–6.9)5 business daysAs needed45 daysHandle within change management process
Low (0.1–3.9)Regular triageGenerally not neededRoutine updates / re-evaluate within 3 months if acceptedQuarterly inventory review

Two-Phase Response: Interim and Permanent

A key practical insight is separating responses into two phases:

  • Interim mitigation: When patching takes time, reduce the attack surface immediately through WAF custom rules, feature disablement, or network isolation
  • Permanent fix: Library upgrade, patch application, or migration to an alternative
flowchart TD
    A[Vulnerability Detected] --> B[Impact Assessment & Triage]
    B --> C{Critical / KEV / Exploit?}
    C -- Yes --> D[Interim Mitigation within 48h]
    D --> E[Permanent Fix within 7 days]
    E --> F[Verification & Re-scan]
    F --> G[Record & Close]
    C -- No --> H{High?}
    H -- Yes --> I[Patch within 14 days]
    I --> F
    H -- No --> J[Queue for Regular Update]
    J --> F
    B --> K{Exception - Accept Risk?}
    K -- Yes --> L[Risk Acceptance Approval]
    L --> M[Compensating Controls + Re-review within 3 months]
    M --> J

Aligning with ISMS and SOC 2 Audits

Despite different terminology, ISMS and SOC 2 audits ask essentially the same questions about vulnerability management.

Audit ConcernISMS (ISO 27001)SOC 2 (TSC)
Can you detect vulnerabilities?Control 8.8: Technical vulnerability managementCC7.1: Identify susceptibilities
Can you prioritize?Risk assessment processRisk-based remediation
Can you remediate within deadlines?PDCA cycle operational evidence”Timely” objective evidence
Are exceptions controlled?Residual risk acceptance & reviewDocumented exception approval
Is there an audit trail?Internal audit recordsOperating effectiveness over observation period

To objectify SOC 2’s “timely,” you need documented severity-based SLAs with compliance rate tracking as a KPI. In a SOC 2 Type II audit, every patch must be shown to have been applied within the defined timeline across a 3–12 month observation period. A single significant deviation risks being reported as an “Exception.”

An audit-ready policy should include at minimum:

  • Documented process: Information sources, triage criteria, severity-based SLAs, change management integration, exception management (approver, deadline, compensating controls)
  • Regularity and continuity: Continuous dependency monitoring (SCA), external assets scanned monthly or more, internal assets quarterly or more
  • Evidence trail: Detection → triage → mitigation → application → verification → close, SLA compliance rates, exception review records

Automation Best Practices

Three-Layer SCA Operations

Effective vulnerability management automation operates across three layers:

  1. Continuous monitoring: Dependabot / Renovate / Snyk for always-on dependency monitoring
  2. Scheduled updates: Monthly to quarterly batch library updates
  3. Emergency response: SLA-driven immediate response for Critical / KEV vulnerabilities

Strategic Dependabot / Renovate Configuration

Simply enabling notifications leads to alert fatigue. Configure strategically:

  • Separate security from feature updates: Route security fixes through a priority pipeline; auto-merge patch-version (z-stream) updates after tests pass
  • Implement cooldown periods: Wait 3–7 days after new version releases to guard against supply chain attacks — but bypass this for known vulnerability patches
  • Leverage EPSS and reachability: Go beyond CVSS by incorporating EPSS (Exploit Prediction Scoring System) and function-level reachability analysis to filter actionable alerts

Exception Management When Patching Isn’t Possible

Legacy systems and compatibility issues will inevitably prevent timely updates. Rather than ignoring these, document the following process — required for SOC 2 and PCI DSS audits:

  1. Formal exception request: Document technical and business reasons for non-compliance
  2. Compensating controls: WAF custom signatures, network micro-segmentation, IPS hardening
  3. Time-bound risk acceptance: Security leadership approval with mandatory re-review within 3 months

Key Takeaways

  1. Few standards prescribe concrete timelines: CISA BOD 19-02 (15/30 days), FedRAMP (30/90/180 days), PCI DSS (30 days), and UK SS-033 (7/14/45 days) are the primary anchor points
  2. Most standards require “define your SLA and operate it”: NIST, ISO 27001, SOC 2, and CIS Controls all follow this structure
  3. CVSS alone is insufficient: The trend is toward exploitation-aware prioritization combining KEV/EPSS, asset exposure, and mitigation availability
  4. Two-phase response is practical: Separate interim mitigation (shrink the attack surface immediately) from permanent fixes (planned library upgrades)
  5. Exception management and evidence are audit keys: Both SOC 2 and ISMS require documented SLAs, compliance rate tracking, and controlled exceptions

There is no single right answer to “how many days to patch,” but by cross-referencing global standards, you can design an SLA that is well-grounded, audit-ready, and operationally practical.

References