NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 Control RA.L2-3.11.3 require organizations handling Controlled Unclassified Information (CUI) to prioritize vulnerabilities based on risk so that limited resources focus on the issues that present the greatest threat to confidentiality, integrity and availability; this post explains a practical, auditable approach to build risk scores, automate prioritization, and document decisions for compliance with the Compliance Framework.
What RA.L2-3.11.3 requires in practice
The control centers on producing and using risk-based prioritization for vulnerability management rather than treating every finding equally—your program must demonstrate that scanning, triage, patching or mitigation decisions are driven by risk to CUI. For Compliance Framework implementations this means maintaining an accurate asset inventory of CUI-bearing systems, scoring vulnerabilities against business impact and exploitability, applying documented SLAs/mitigation workflows by risk tier, and retaining artifacts (scan reports, tickets, mitigation evidence) to satisfy auditors.
Build a practical risk-scoring model
A useful risk score combines technical severity (CVSS v3.1 base score), exposure (internet-facing or not), asset criticality (data classification and mission impact), and threat context (public exploit availability / active exploitation). Example weighted formula: RiskScore(0-100) = round(100 * (0.50 * (CVSS_base/10) + 0.25 * (AssetCriticality/5) + 0.15 * Exposure + 0.10 * ThreatIntel)). Here AssetCriticality is 1–5 (5 = hosts processing CUI), Exposure is 0 or 1 (0.5 for DMZ/internal with VPN), ThreatIntel is 0–1 based on exploit maturity (0 = none, 1 = active exploit). That formula is simple to compute in any vulnerability management platform or SIEM and produces three practical tiers: 85–100 = Critical, 60–84 = High, 30–59 = Medium, <30 = Low.
Implementing the model for a small business
Small businesses (e.g., a 50–200 employee subcontractor) can implement this without heavy tooling. Step 1: inventory CUI assets using a CSV or CMDB and tag them in your scanner. Step 2: run authenticated weekly scans on servers and monthly on desktops using open-source (OpenVAS/GVM) or commercial scanners (Tenable, Qualys). Step 3: compute the risk score in a spreadsheet or ingest scan output into a lightweight platform (Kenna, DefectDojo) and apply the above formula. Step 4: define SLAs: Critical = 24–72 hours, High = 7 days, Medium = 30 days, Low = next patch cycle. Step 5: document exceptions with compensating controls, mitigations, and an approval workflow tied to change control.
Real-world small-business scenario
Example: A small defense subcontractor scans and finds a public-facing web application with CVE-2024-12345 rated CVSS 9.8 and proof-of-concept exploit in the wild. AssetCriticality = 5 (hosts CUI), Exposure = 1 (internet-facing), ThreatIntel = 1 (active exploit). RiskScore ≈ 100 (Critical). Action: create an emergency ticket, apply a virtual patch (WAF rule) within 4 hours, isolate the host to a quarantine VLAN, schedule vendor patch within 24 hours, and capture evidence (WAF logs, ACL changes, patch record). For audit, export the scan, ticket, and change logs showing timeline and decision rationale. This demonstrates RA.L2-3.11.3 compliance: risk-driven prioritization and documented mitigation.
Technical integration and automation
To scale, integrate scanners with ticketing (ServiceNow/Jira) and SOAR playbooks. Use scanner APIs to push CVE, CVSS and asset tags into a vulnerability management database, calculate the RiskScore programmatically, and auto-create tickets with priority and SLA fields. Enrich with threat feeds (CISA KEV, ExploitDB, Recorded Future) to set ThreatIntel. Configure automated actions for Critical scores (e.g., apply WAF signature, isolate via SDN, deploy EDR containment) and require manual approval only for exception documentation. Ensure logs (SIEM) collect and retain timestamps for detection, triage and remediation to satisfy auditors assessing timelines.
Compliance tips and best practices
Maintain an auditable trail: store raw scan exports, normalized risk scores, tickets, change approvals and test/verification evidence in a compliance binder or secure document repository. Define and document your scoring formula in your risk management policy and map it to the Compliance Framework control RA.L2-3.11.3. Implement an exception process with documented compensating controls (segmentation, MFA, logging) and periodic review cadence. Key metrics: Mean Time to Remediate (MTTR) by tier, % of CUI assets scanned on schedule, and % of Critical vulnerabilities mitigated within SLA—these are the primary artifacts auditors will look for.
Failing to implement risk-based prioritization increases the chance of an exploitable vulnerability leading to CUI exfiltration, service disruption, contract penalties, and loss of eligibility to handle federal contracts; beyond regulatory consequences, undifferentiated remediation wastes scarce IT resources and delays fixes to truly critical issues. By adopting a clear scoring model, automating enrichment and workflows, and keeping structured evidence, small businesses can meet RA.L2-3.11.3, reduce real risk, and demonstrate compliance with NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2.