🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-3

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-3

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 2-10-3 – The cybersecurity requirements for technical vulnerabilities management must include at least the following:

Understanding the Requirement

This control is part of the Essential Cybersecurity Controls (ECC – 2 : 2024) framework. At a high level, it requires an organized technical vulnerability management program composed of the five sub-elements listed as 2-10-3-1 through 2-10-3-5. Together these items define a lifecycle approach: discovering or tracking vulnerabilities, assessing their impact, prioritizing actions, applying mitigations or fixes, and verifying that remediation is effective (including handling accepted exceptions). For an SMB this means formalizing simple, repeatable steps so vulnerabilities are identified, risk-rated, remediated, and documented on an ongoing basis.

Technical Implementation

  • Create and maintain an asset inventory tied to vulnerability scans. Use an up-to-date list of servers, workstations, network devices, and cloud resources. Schedule automated authenticated scans (weekly or at least monthly) for internet-facing and critical internal assets; add lightweight agents or scheduled scans for endpoints that cannot be agentized.
  • Implement a risk-based prioritization process. Map scan results to a simple risk matrix that considers CVSS score, asset criticality (business function, data sensitivity), and exposure (public internet vs internal). Prioritize remediation for high-severity findings on critical or internet-facing assets within defined SLAs (e.g., 7 days for critical, 30 days for high).
  • Define and execute remediation actions and compensating controls. For each prioritized finding, assign an owner, choose a remediation method (patch, configuration change, removal), or apply a compensating control (network segmentation, host firewall rule) if immediate patching isn’t possible. Track progress in a ticketing system and set escalation for overdue items.
  • Test and verify remediation. After applying patches or controls, re-scan the affected assets to confirm the vulnerability is resolved. Keep evidence (scan reports, change tickets, screenshots of configuration) logged for audit and future trend analysis.
  • Establish exception handling and reporting. Define how and when exceptions are approved, time-limited, and reviewed (e.g., exceptions must have business justification, compensating controls, and a review cadence of 30–90 days). Produce a monthly dashboard for leadership showing open vulnerabilities, average time-to-remediate, and exceptions.

Example in a Small or Medium Business

AcmeCo is a 75-person professional services firm that hosts client data on a small cloud environment and uses a mix of Windows laptops and Linux servers. They implement control 2-10-3 by first putting together a simple asset register in a spreadsheet and tagging each asset as critical, important, or general. They run authenticated vulnerability scans on servers every week and a lighter scan on employee laptops every two weeks. Scan results populate a ticketing queue where the IT lead triages based on severity and criticality: critical public-facing issues get a 7-day SLA and are patched within an emergency change window; high-severity internal findings are scheduled into the next maintenance cycle. When a patch cannot be applied immediately to a production server, the team applies a temporary firewall rule and documents the compensating control and an exception approval that expires in 30 days. After remediation, the team re-scans the host to verify the fix and attaches the report to the ticket. Each month the CTO reviews a concise dashboard showing open vulnerabilities, SLA compliance, and any active exceptions to ensure ongoing visibility and continuous improvement.

Summary

Implementing control 2-10-3 means establishing a repeatable vulnerability management lifecycle: inventory and scanning, risk-based prioritization, assigned remediation with compensating controls, verification of fixes, and documented exception handling. For SMBs, the practical path is to automate scanning where possible, use simple risk matrices and SLAs to focus scarce resources, track work in an existing ticketing tool, and maintain evidence of remediation. These combined policy and technical measures ensure vulnerabilities are identified, acted on, and validated in a way that meets the control’s expectations while remaining achievable for small teams.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes