🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-2

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-2

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-2 – The cybersecurity requirements for technical vulnerabilities management must be implemented.

Understanding the Requirement

This control requires an organization to implement an approved vulnerabilities management program that detects, classifies, addresses, and escalates technical vulnerabilities in a consistent way. As part of the Essential Cybersecurity Controls (ECC – 2 : 2024), the program should include periodic assessments, severity classification, defined remediation procedures tied to risk, an escalation mechanism, and linkage between vulnerability management and patch management. The goal is to ensure vulnerabilities are found, prioritized, remediated, tracked, and verified in line with the organization's risk tolerance and business needs.

Technical Implementation

  • Document a Vulnerability Management Policy and Procedures: Create a short, approved policy that defines scope (assets, networks, cloud services), roles and responsibilities (who scans, who triages, who approves remediation), frequency of activities, and key metrics (time-to-detect, time-to-remediate, percent verified). Keep the procedure practical for SMB scale—use plain language and a single owner for operations (IT lead or managed service).

  • Regular, Scheduled Scanning and Discovery: Run authenticated vulnerability scans on a schedule (e.g., external perimeter weekly or biweekly; internal critical systems monthly; less critical systems quarterly). Combine automated scans with agent-based discovery where possible to cover cloud workloads and remote endpoints. Maintain an up-to-date asset inventory so scans focus on in-scope systems.

  • Severity Classification and Risk-Based Prioritization: Adopt a consistent severity model (e.g., CVSS v3 plus business impact). Map severity levels to concrete remediation SLAs—example: Critical/High = patch or mitigate within 7 days, Medium = 30 days, Low = 90 days. Include compensating controls (isolate system, apply firewall rule, temporary configuration change) when immediate patching isn’t possible.

  • Triage, Ticketing, and Escalation Workflow: Integrate scan results into your ticketing system (Jira, ServiceNow, or a managed provider dashboard). Define triage steps: verify false positives, assign owner, set SLA, and identify mitigation steps. Create an escalation path for items that miss SLAs—notifications to IT manager, then CTO/owner, and board-level reporting for sustained high-risk exposures.

  • Link to Patch Management and Change Control: Ensure vulnerabilities that require software updates are routed into your patch management process with approved change windows. For SMBs, define emergency patching rules to bypass normal windows for Critical vulnerabilities, with post-change testing and rollback plans. Keep evidence of patching and post-remediation scans for audit and review.

  • Verification, Measurement, and Continuous Improvement: Perform rescans to confirm remediation, maintain a vulnerability dashboard (counts by severity, aging tickets), and hold a monthly review to validate process metrics and tune scanning scope. Use lessons learned to update asset inventory, adjust scan frequency, and improve classification rules.

Example in a Small or Medium Business

A 45-person managed services SMB runs a mix of cloud-hosted applications and three on-premises servers. The IT lead establishes a short Vulnerability Management Procedure and schedules authenticated internal scans monthly and external scans weekly using a cloud-based scanner. Scan results are automatically imported into the company’s ticketing system where the IT lead triages, verifies false positives, and assigns remediation tickets. The organization maps CVSS scores to SLAs: Critical within 7 days, High within 14 days, Medium within 30 days, and Low within 90 days. For critical vulnerabilities that affect public-facing systems, the team applies an emergency patching process tied to the change control board and documents rollback steps. If a critical item is not resolved within the SLA, the system triggers an escalation email to the CTO and the owner schedules a remediation meeting. After remediation, the IT lead performs a rescanning step to confirm the fix and closes the ticket only when verification is successful; monthly reports track trends and inform decisions to increase scan frequency or update compensating controls.

Summary

Implementing an approved vulnerability management program combines straightforward policy with repeatable technical actions: regular scanning and discovery, consistent severity classification, risk-based remediation SLAs, a ticketing and escalation workflow, and close integration with patch management. For SMBs this means defining clear ownership, automating where possible, and focusing on verification and measurable SLAs so vulnerabilities are not just found but reliably remediated and tracked. These measures together meet the control by turning detection into timely, accountable remediation that reduces exposure and supports business continuity.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes