🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Prioritize and Remediate Vulnerabilities According to Risk Assessments — NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - RA.L2-3.11.3

Practical guidance for small businesses to prioritize and remediate vulnerabilities under NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 RA.L2-3.11.3 using asset-based risk assessment, SLAs, and automated tooling.

April 01, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control RA.L2-3.11.3 requires organizations handling Controlled Unclassified Information (CUI) to prioritize and remediate vulnerabilities according to risk assessments — a practical, repeatable program that ties scanning results to asset criticality, business impact, and defensible remediation timelines. This post explains how a small business can implement that control in real operational terms, with tools, SLAs, examples, and compliance-focused evidence generation.

Understanding the requirement and scope

The control expects that you do more than run scans: you must use a documented risk assessment process to prioritize which findings get fixed first and then remediate those issues in line with prioritized risk. For organizations subject to NIST SP 800-171/CMMC Level 2, this means focusing on systems that store, process, or transmit CUI and applying the risk-based prioritization consistently across servers, endpoints, network devices, cloud assets, and applications.

Step-by-step implementation

1) Asset inventory and classification

Begin with a definitive asset inventory (hostnames, IPs, OS, owner, function, CUI presence). Tag assets by criticality (e.g., Tier 1: CUI storage and authentication servers; Tier 2: application servers; Tier 3: user desktops). Use an authoritative CMDB or a simple CSV maintained in version control if your environment is small. Example tools: ServiceNow, NetBox, or a business-managed Google Sheet plus automation via Ansible or Powershell to validate state weekly.

2) Vulnerability identification and scoring

Run authenticated and unauthenticated vulnerability scans on a defined cadence: internet-facing assets weekly, internal servers monthly, and endpoints quarterly. Use scanners like Tenable Nessus, Qualys, Rapid7, or OpenVAS. Normalize findings with CVSSv3 scores and map to your asset tags. Enrich scan results with threat intelligence (exploit availability, public weaponization) and EDR/SIEM telemetry (indications of attempted exploitation) to raise priority for actively targeted CVEs.

3) Prioritization and remediation SLAs

Translate risk assessments into measurable SLAs. A reasonable small-business starting point: Critical (CVSS ≥ 9.0 or exploited in the wild and CUI exposure): remediate or mitigate within 7 days; High (7.0–8.9 or high business impact): 30 days; Medium (4.0–6.9): 90 days; Low (<4.0): patch in the next standard release cycle or 6 months. Adjust based on compensating controls, system uptime windows, and vendor patch availability. Record the decision rationale (asset owner approval + risk acceptance) in your ticketing system for audit evidence.

4) Remediation methods and compensating controls

Remediation options include patching, configuration change (disable services, tighten ACLs), redeploying to patched images, or isolating the asset in a segmented VLAN. Where immediate patching breaks operations, deploy compensating controls: virtual patching via WAF or IPS rules, host-based firewall rules, privilege reduction, or temporary removal of CUI from the asset. Use automation (SCCM/Intune, Ansible, Chef) to reduce human error and document every change through change control tickets and rollback plans.

5) Exception & risk acceptance process

Implement a formal exception process for unavoidable delays: require a documented risk acceptance form that includes compensating controls, residual risk assessment, approver (e.g., CISO or designated senior manager), and an expiration date for the acceptance. Log exceptions in the CMDB and make sure they are re-reviewed before expiration. This process is key evidence for auditors reviewing RA.L2-3.11.3 compliance.

Real-world small business scenario

Example: A 50-person defense subcontractor runs a near-term project with CUI on an on-prem application server (Ubuntu LTS), an Azure SQL DB, and several Windows 10 user laptops. The vulnerability scan finds a critical kernel CVE on the application server and a high-priority RCE in a publicly exposed Tomcat instance. The team tags the app server as Tier 1, applies an emergency kernel patch during a maintenance window (7-day SLA), places the Tomcat host behind a WAF rule to block the exploit signature immediately, and schedules a full Tomcat upgrade within 14 days. All actions are recorded in JIRA with links to scan findings and approvals — evidence for a future CMMC assessment.

Compliance tips and best practices

Keep these practical habits: (1) integrate scanner output with your ticketing system so findings create actionable tickets with owner and SLA, (2) use EDR/SIEM correlation to prioritize vulnerabilities that show exploitation patterns, (3) automate repetitive remediation tasks and baseline images, (4) review and tune scanner configurations quarterly to reduce noise, and (5) maintain a metrics dashboard (open vulnerabilities by age, MTTR, percentage of criticals remediated within SLA) to demonstrate continuous improvement to assessors.

Risks of non-compliance

Failing to prioritize and remediate per a documented risk assessment exposes you to data breaches, loss or exposure of CUI, contractual penalties, delayed or failed CMMC certification, and reputational harm. For small businesses, a single exploited vulnerability can lead to lost DoD contracts and costly incident response — making a measurable, documented vulnerability management program operationally and financially necessary.

Summary: To meet NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 RA.L2-3.11.3, build a repeatable process that ties asset classification to scan results, enriches findings with risk context, enforces SLA-based remediation, documents exceptions, and uses automation and compensating controls where necessary. For small businesses, focus on a tight inventory, prioritized SLAs, integrated tooling, and traceable evidence — those are the elements auditors and assessors look for when validating compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes