Skip to main content
NetStable
Level 1 SI.L1-3.14.1

Identify, report, and correct system flaws in a timely manner

📖 What This Means

This control means you need to have a process to find, document, and fix problems in your IT systems quickly. Think of it like regular maintenance for your car - you check for issues (like software bugs or security holes), report them to the right people, and get them fixed before they cause bigger problems. For example, when Microsoft releases a Windows update to fix a security flaw, you'd need to install that patch within a reasonable time (typically 30 days for critical fixes). Another example is when your antivirus software detects a vulnerability in an application - you'd need to address that finding promptly.

🎯 Why It Matters

Unpatched system flaws are the #1 entry point for cyber attacks. The 2023 Verizon DBIR found that 60% of breaches involved vulnerabilities where a patch was available but not applied. For defense contractors, this is especially critical because adversaries target known flaws in supply chain systems. A real-world example is the 2017 Equifax breach, where hackers exploited an unpatched web application vulnerability affecting 147 million people. From a DoD perspective, this control ensures Controlled Unclassified Information (CUI) isn't compromised through preventable technical weaknesses. The average cost of a small business data breach is $165,000 - often enough to put a contractor out of business.

How to Implement

  1. 1. Enable automated vulnerability scanning in your cloud console (AWS Inspector, Azure Security Center, or GCP Security Command Center)
  2. 2. Configure weekly scans of all cloud assets with medium/high severity findings emailed to IT staff
  3. 3. Set up patch management policies in your cloud provider's systems (e.g., AWS Systems Manager Patch Manager)
  4. 4. Create a 30-day SLA for critical patches in your cloud governance policy
  5. 5. Document all cloud patching activities in a shared spreadsheet or ticketing system
  6. 6. Enable cloud provider security advisories (e.g., AWS Security Bulletins RSS feed)
  7. 7. Test patches in a staging environment before production deployment
⏱️
Estimated Effort
Initial setup: 8-16 hours (IT generalist skill level). Ongoing: 2-4 hours/month for scanning and patching activities.

📋 Evidence Examples

Vulnerability Scan Reports

Format: PDF/CSV
Frequency: Monthly
Contents: Date, system scanned, vulnerabilities found (CVE IDs), severity levels
Collection: Export from scanning tool

Patch Management Log

Format: Spreadsheet
Frequency: Updated with each patch cycle
Contents: Patch name, date identified, date applied, responsible person
Collection: Manual entry or WSUS export

Remediation Tickets

Format: Ticket system export
Frequency: Per vulnerability
Contents: Ticket #, vulnerability description, remediation steps, closure date
Collection: Export from help desk system

Patch Policy Document

Format: PDF/Word
Frequency: Annual review
Contents: Written procedures for identifying/reporting/fixing flaws, SLAs
Collection: Create in policy template

Training Records

Format: Sign-in sheets/certificates
Frequency: Annual
Contents: Staff trained on vulnerability reporting procedures
Collection: HR records

📝 SSP Guidance

Use this guidance when writing the System Security Plan (SSP) narrative for this control.

How to Write the SSP Narrative

For SI.L1-3.14.1 ("Identify, report, and correct system flaws in a timely manner"), your SSP narrative should specifically describe: (1) the tools and technologies you use to implement this control, (2) the configuration or process that enforces it, (3) who is responsible for maintaining it, and (4) what evidence proves it's working. Describe your system and information integrity controls, including patch management process, antivirus/EDR deployment, email gateway protection, SIEM monitoring, and application security measures. Be specific -- name your actual products, settings, and responsible personnel.

Example SSP Narratives

Cloud (Azure/AWS)

"SI.L1-3.14.1 is implemented using cloud-native controls. [Organization] uses [specific cloud service/feature] to identify, report, and correct system flaws in a timely manner. The configuration is managed through [Azure Policy/AWS Config/Terraform] and monitored via [SIEM tool]. Responsible party: [IT Security Manager]. Evidence: [specific artifact, e.g., 'Azure AD Conditional Access policy screenshot, CloudTrail logs']."

On-Premise

"SI.L1-3.14.1 is implemented through on-premise infrastructure controls. [Organization] uses [Active Directory/Group Policy/specific tool] to identify, report, and correct system flaws in a timely manner. Configuration is documented in [location] and audited [frequency]. Responsible party: [System Administrator]. Evidence: [specific artifact, e.g., 'Group Policy export, Windows Event logs']."

Hybrid

"SI.L1-3.14.1 is implemented across both cloud and on-premise environments. [Organization] uses [Azure AD Connect/hybrid tool] to ensure consistent enforcement. Cloud resources are managed via [cloud tool] and on-premise systems via [on-prem tool]. Both environments report to [centralized SIEM]. Responsible party: [IT Director]. Evidence: [artifacts from both environments]."

System Boundary Considerations

  • Identify all systems requiring patch management within the CUI boundary
  • Document EDR/AV coverage across endpoints and servers
  • Specify SIEM monitoring coverage and alert rules
  • Ensure this control covers all systems within your defined CUI boundary where identify, report, and correct system flaws in a timely manner applies
  • Document any systems where this control is not applicable and explain why

Key Documentation to Reference in SSP

  • 📄 System and Information Integrity Policy
  • 📄 Patch management reports
  • 📄 AV/EDR deployment records
  • 📄 SIEM alert configuration
  • 📄 Evidence artifacts specific to SI.L1-3.14.1
  • 📄 POA&M entry if control is not fully implemented

What the Assessor Looks For

The assessor will verify patch management SLAs are met, check AV/EDR deployment coverage (should be 100%), review SIEM alert rules and response times, and test that email gateway blocks malicious content.

💬 Self-Assessment Questions

Use these questions to assess your compliance. Each "NO" answer provides specific remediation guidance.

Question 1: Do we have a documented process for identifying system vulnerabilities?

✅ YES → Proceed to Q2
❌ NO → GAP: Create a vulnerability management policy template within 30 days
Remediation:
Use NIST SP 800-40 as a guide for policy creation

Question 2: Are vulnerability scans performed at least monthly?

✅ YES → Proceed to Q3
❌ NO → GAP: Schedule monthly scans in OpenVAS or commercial tool within 7 days
Remediation:
Set calendar reminders for scan execution

Question 3: Do we have records showing critical patches applied within 30 days of release?

✅ YES → Proceed to Q4
❌ NO → GAP: Review last 3 months of patches and remediate any overdue critical updates within 14 days
Remediation:
Prioritize patches with CVSS scores >7.0

Question 4: Is there a designated person responsible for tracking vulnerability remediation?

✅ YES → Proceed to Q5
❌ NO → GAP: Assign vulnerability management responsibilities in writing within 7 days
Remediation:
Add to job description in HR files

Question 5: Can we produce evidence of vulnerability scans and patching for the last 90 days?

✅ YES → COMPLIANT
❌ NO → GAP: Conduct immediate scan and document all remediation activities within 14 days
Remediation:
Store evidence in a dedicated compliance folder

⚠️ Common Mistakes (What Auditors Flag)

1. Scanning but not remediating findings

Why this happens: Lack of follow-through or resource constraints
How to avoid: Implement a ticketing system to track all vulnerabilities to closure

2. No documentation of patching activities

Why this happens: Assuming automated systems are sufficient evidence
How to avoid: Maintain a manual log with screenshots of update histories

3. Missing legacy systems in scans

Why this happens: Old systems not in modern inventory lists
How to avoid: Conduct a full network discovery scan quarterly

4. No vulnerability scanning for 3rd party software

Why this happens: Focus only on operating system patches
How to avoid: Configure scans to check all installed applications

5. Untrained staff on reporting procedures

Why this happens: Assuming IT will automatically find all issues
How to avoid: Annual training for all staff on how to report suspicious system behavior

📚 Parent Policy

This practice is governed by the System and Information Integrity Policy

View SI Policy →

📚 Related Controls