Warning

Work in Progress: This page is currently under construction. Content may be incomplete or subject to change. To contribute, see the contribution guide.

Vulnerability Management

Process for identifying, prioritising, and remediating security vulnerabilities in Patria Investments’ systems.


Scope

Covers vulnerabilities in:

  • Application dependencies (third-party libraries and packages)
  • Container images
  • Cloud infrastructure configuration (Azure, GCP)
  • Operating systems and server software

Sources

SourceTool / MethodFrequency
Dependency scanningGitHub DependabotContinuous
Container image scanningIntegrated into CI/CD pipelineOn every build
Cloud configurationAzure Defender for Cloud, GCP Security Command CenterContinuous
Penetration testingExternal vendorAnnual
Threat intelligenceSecurity team subscriptionOngoing

Severity and remediation SLAs

SeverityCVSS ScoreRemediation SLA
Critical9.0 – 10.0Within 24 hours
High7.0 – 8.9Within 7 days
Medium4.0 – 6.9Within 30 days
Low0.1 – 3.9Next planned release

Process

  1. Detection: Automated scanners or manual discovery identifies a vulnerability
  2. Triage: Security team assesses severity, affected systems, and exploitability
  3. Assignment: Ticket created in GitHub or ServiceNow and assigned to the responsible team
  4. Remediation: Team patches dependency, updates configuration, or applies workaround
  5. Verification: Security team confirms the fix
  6. Closure: Ticket closed with fix reference and date

Exception process

If a vulnerability cannot be remediated within the SLA, a formal exception must be submitted to the Security team including:

  • Justification and business impact of deferral
  • Compensating controls in place
  • Target remediation date
  • Approver (squad lead + Security team)

Contact

Security & Compliance team — see Contacts

0 items under this folder.