Security work breaks down when responsibilities are vague. A vulnerability management SLA aligns security, engineering, and leadership on one thing: how fast risk must be reduced based on severity and business impact.
Also see: Incident Response Plan Template, Website Security KPIs Dashboard, Security Questionnaire Response Playbook, and SOC 2 Technical Controls for Startups.
Why an SLA is essential
- Prevents critical findings from staying open indefinitely.
- Creates shared expectations between security and product teams.
- Makes risk visible through measurable deadlines and breaches.
- Supports enterprise buyer trust during due diligence.
SLA template by severity
Severity Triage SLA Remediation SLA Example
Critical 4 hours 24-72 hours Exposed secrets, RCE, auth bypass
High 1 business day 7 days SQLi, stored XSS, admin exposure
Medium 3 days 30 days Missing hardening controls
Low 7 days 90 days Informational hygiene issues
Use this as a baseline. Adjust only with documented business risk acceptance and an approved expiration date.
Ownership and escalation model
- Security owner: validates severity and opens remediation ticket.
- Engineering owner: implements fix and submits verification evidence.
- Team lead: escalates if SLA breach risk appears.
- Executive sponsor: resolves cross-team blockers for critical issues.
Every finding should include: business impact, technical owner, target fix date, and verification method. Without these four fields, SLA tracking becomes unreliable.
Reporting dashboard metrics
- Open findings by severity and age bucket.
- SLA breach count by team/service.
- Mean time to triage (MTTT) and remediate (MTTR).
- Top recurring root causes (config, patching, code patterns).
Implementation rollout plan
- Agree severity definitions with engineering and leadership.
- Pilot SLA process on one product area for two weeks.
- Automate ticket creation and due dates from scan findings.
- Review monthly breaches and tune controls/processes.
Defining severity correctly
SLA effectiveness depends entirely on consistent, calibrated severity assignment. Under-rating findings to avoid SLA pressure is the most common way vulnerability management programs fail. Establish severity definitions that are objective and non-negotiable, especially for the Critical tier.
- Critical: Conditions that allow unauthenticated remote code execution, credential exposure of production systems, active exploitation confirmed in the wild, or direct customer data exfiltration. Examples: exposed
.envfile with database credentials, unauthenticated admin access, RCE vulnerability in a production-facing service. - High: Conditions that allow authenticated RCE, significant data exposure, stored XSS affecting all users, SQL injection in a production endpoint, or authentication bypass. Examples: SQLi in search endpoint, stored XSS in user profile fields, exposed admin panel without IP restriction.
- Medium: Issues that increase exploitability but require additional conditions. Examples: missing security headers (CSP, HSTS), verbose error messages revealing stack traces, CORS misconfiguration without credentials, open directory listing.
- Low: Hygiene issues with minimal direct exploitability. Examples: missing cookie flags (HttpOnly on non-sensitive cookies), overly verbose server version disclosure, informational SSL configuration recommendations.
Managing SLA exceptions and risk acceptance
Not every finding can be remediated within the standard SLA. Legitimate exceptions exist — but they must be formal, documented, and time-limited. Informal exceptions ("we know about it, we'll fix it later") are how critical vulnerabilities stay open for months.
# Risk acceptance record (required for each exception)
Finding ID: [ID from scan or tracker]
Severity: [Critical / High / Medium / Low]
Description: [Brief finding summary]
Business reason: [Why standard SLA cannot be met]
Compensating ctrl:[What reduces the risk in the interim]
Accepted by: [Name and role — must be authorized approver]
Review date: [Date this acceptance expires — maximum 30 days for Critical]
Final fix target: [Date remediation is committed for]
Critical findings should never receive acceptance periods longer than 30 days. High findings should not exceed 60 days. Any exception at Critical/High tier requires executive-level sign-off.
Tooling and automation for SLA enforcement
Manual SLA tracking does not scale beyond a handful of findings. Once a program matures beyond the pilot phase, automation is required to maintain accuracy and reduce administrative overhead.
- Scanner integration: External scan results should automatically create tickets in your issue tracker (Jira, Linear, GitHub Issues) with severity, due date, and owner pre-populated. Integrate AI QA Monkey scan exports or API with your ticketing system.
- Due date enforcement: Configure automated reminders at 50% of SLA elapsed (heads-up), 80% (escalation warning), and at breach. Reminders should go to both the engineering owner and their team lead.
- SLA breach alerts: Any breach of a Critical or High SLA should trigger an immediate notification to the engineering VP or CTO. Normalization of breaches without escalation is a program failure signal.
- Weekly digest reports: Automated weekly summary to leadership: open findings by severity, SLA compliance rate, MTTR trend, and new findings this week. This creates accountability without requiring security to manually prepare reports.
Integrating the SLA with your security program
A standalone SLA document has limited value. The SLA becomes a real program component when it is integrated with your other security operations:
- Linked to incident response: When an incident is declared, the affected findings in the vulnerability tracker should be immediately escalated to Critical regardless of their original severity. The incident response plan should reference the vulnerability SLA escalation process.
- Referenced in security questionnaires: Enterprise buyers consistently ask "What are your SLAs for vulnerability remediation?" Having a documented, enforced SLA with tracked metrics is a direct sales enabler. See the security questionnaire playbook.
- Evidence for SOC 2 / ISO 27001: Auditors require evidence of a vulnerability management program with defined timelines. Your SLA document, ticket history, and monthly metrics reports constitute direct audit evidence for SOC 2 CC7 and ISO 27001 A.12.6.
- Feeding KPI dashboards: MTTR, SLA breach rate, and open critical count are the three most important vulnerability metrics. Track them in a security KPI dashboard that is reviewed at least monthly.
Need consistent finding input for your SLA process?
Use recurring external scans to feed accurate, severity-based findings into your remediation workflow.
Run Security ScanFrequently Asked Questions
What is a vulnerability SLA?
It is a policy that sets maximum time windows for triage and remediation based on severity, ownership, and escalation rules.
How strict should deadlines be?
Be strict on critical/high findings; use exceptions only when documented with risk acceptance and review dates.
How do we prove progress to leadership?
Track breach rate, MTTR, and open critical findings trend over time, then tie those metrics to reduction initiatives.