Vulnerability Management
VDA ISA 8.3.1 requires you to run a formal vulnerability management process that finds technical weaknesses through regular scanning, prioritizes fixes based on risk, patches within defined timelines, and tracks remediation to closure across all in-scope systems (VDA ISA Catalog v6.0). To operationalize it fast, define scope, scanning cadence, severity-to-SLA rules, exception handling, and evidence that proves continuous execution (VDA ISA Catalog v6.0).
Key takeaways:
- You must prove repeatable scanning, risk-based prioritization, timely patching, and closure tracking (VDA ISA Catalog v6.0).
- Auditors look for governance: defined timelines, ownership, exceptions, and measurable remediation progress.
- Coverage matters: include endpoints, servers, network devices, cloud assets, and externally exposed services, plus third-party managed components where you own patch decisions.
“Vulnerability management requirement” in TISAX assessments often fails for one simple reason: teams do the technical work but cannot show a controlled process that runs continuously, produces decisions, and drives remediation to closure. VDA ISA 8.3.1 is explicit that you need a vulnerability management process with regular scanning, risk-based prioritization, and timely patching (VDA ISA Catalog v6.0). That means you need more than a scanner report. You need scope, roles, workflows, timelines, tracking, and exception handling that match how your environment actually operates.
For a CCO or GRC lead, the fastest path is to treat vulnerability management like any other governed operational control: define what “in scope” means, set rules for how findings are triaged and fixed, and retain artifacts that show the process runs consistently. Done well, this requirement also reduces downstream risk across incident response, change management, and third-party oversight, because the same data feeds all three.
This page gives requirement-level implementation guidance you can hand to IT and security leaders and then audit internally with confidence against VDA ISA 8.3.1 (VDA ISA Catalog v6.0).
Regulatory text
Regulatory excerpt: “Establish a vulnerability management process including regular scanning, risk-based prioritization, and timely patching.” (VDA ISA Catalog v6.0)
Operator interpretation (what the assessor expects):
- A defined process exists (documented and implemented), not just ad hoc patching (VDA ISA Catalog v6.0).
- Regular scanning occurs for the systems you operate or administer, and results are captured (VDA ISA Catalog v6.0).
- Risk-based prioritization drives remediation order and urgency, instead of fixing items randomly or only by CVSS (VDA ISA Catalog v6.0).
- Timely patching is governed by defined timelines that you can explain and enforce (VDA ISA Catalog v6.0).
- Tracking to closure exists across all systems, with visibility into backlog, exceptions, and overdue items (VDA ISA Catalog v6.0).
Plain-English requirement interpretation
You need an end-to-end workflow that: (1) discovers vulnerabilities on an agreed scope, (2) decides what matters first using risk, (3) fixes issues within set timeframes, and (4) proves completion or formally approved exceptions. “Timely” does not mean “instant.” It means you set patch timelines that fit your environment and you can show you meet them or manage deviations deliberately.
Who it applies to (entity and operational context)
Entity types: Automotive suppliers and OEMs pursuing TISAX assessments, or organizations aligning to the VDA ISA control catalog (VDA ISA Catalog v6.0).
Operationally, this applies wherever you:
- Operate corporate IT (endpoints, servers, network gear).
- Run production or engineering environments (including build systems and test rigs) where security patching has safety, uptime, or compatibility constraints.
- Host or manage cloud workloads (IaaS/PaaS/SaaS configurations, images, containers).
- Expose services to the internet (VPNs, portals, APIs, remote access).
- Rely on third parties to operate systems on your behalf, while you retain accountability for security outcomes and evidence.
What you actually need to do (step-by-step)
1) Define scope and asset coverage
- Create an asset inventory view used for vulnerability coverage, even if it is assembled from multiple sources (CMDB, EDR, cloud inventory, MDM).
- Declare what “in scope” means for scanning and patching: corporate endpoints, servers, network devices, cloud instances, containers, externally exposed services, and privileged tooling.
- Assign ownership per asset class (example: end-user compute owned by EUC team, servers by infrastructure, cloud by platform team, apps by engineering).
Practical checkpoint: if you cannot list what should be scanned, you cannot prove “regular scanning.”
2) Establish scanning methods and a repeatable schedule
- Select scanning approaches by environment, such as authenticated internal scanning for servers, agent-based visibility for endpoints, and external scanning for internet-facing assets.
- Document scanning frequency per asset class and define triggers for out-of-cycle scans (new critical exploit, major system build, new internet exposure).
- Control scanner access and credentials (who can run scans, how credentials are rotated, and where scan outputs are stored).
Evidence tip: auditors often ask for “the last several scan runs,” plus proof that scans are not one-off.
3) Triage and normalize findings
- Deduplicate findings and map them to assets and owners.
- Validate signal quality by separating confirmed vulnerabilities from false positives and informational items.
- Categorize remediation type: patch, configuration hardening, compensating control, or accept risk.
Operational hangup: teams get stuck arguing about CVSS. Your process should allow overrides based on exposure and business impact.
4) Implement risk-based prioritization rules
Create a simple, explainable prioritization model that your teams will actually follow. A workable approach is a decision matrix that combines:
- Technical severity (scanner severity/CVSS as an input).
- Exposure (internet-facing, reachable from untrusted networks, lateral movement paths).
- Asset criticality (systems supporting manufacturing, engineering, customer data, identity, or remote access).
- Exploit context (known exploitation in the wild, available exploit code, active targeting of your sector).
Document who can set or change the risk rating and how disputes are resolved. Assessors want to see governance, not only math (VDA ISA Catalog v6.0).
5) Define “timely patching” with internal SLAs and workflow
- Set patch timelines by risk tier (your own policy), with a clear start point (detection date) and end point (remediation verified).
- Integrate with change management so high-risk fixes can be expedited while still controlled.
- Cover non-patch remediation (configuration change, feature disablement, compensating controls), with the same tracking discipline.
- Handle patch constraints explicitly (manufacturing windows, validation requirements, vendor dependency).
CCO/GRC move that works: require each overdue item to have either a closure date or an approved exception with compensating controls and review cadence.
6) Track remediation to closure and report status
- Use a system of record for findings and remediation status (ticketing, vulnerability platform, or GRC workflow).
- Require “closure evidence” such as rescan results or patch verification logs.
- Produce routine metrics that show backlog, time-to-remediate by risk tier, and overdue exceptions.
If you want to operationalize quickly across many teams and third parties, Daydream can help centralize evidence requests, track remediation attestations, and keep vulnerability artifacts tied to the exact control requirement for audit readiness.
7) Manage exceptions (risk acceptance) with discipline
- Define who can approve exceptions (by risk level).
- Require a written rationale, compensating controls, and an expiry or review trigger.
- Track exceptions like vulnerabilities so auditors can see you did not “ignore” findings; you made a governed risk decision.
Required evidence and artifacts to retain
Keep artifacts that prove the process exists and runs continuously (VDA ISA Catalog v6.0):
Governance
- Vulnerability management policy/standard (scope, roles, prioritization method, patch timelines) (VDA ISA Catalog v6.0).
- RACI or ownership map for remediation.
Execution evidence
- Recent scan schedules/configurations and outputs (internal and external as applicable).
- Vulnerability register/backlog with statuses and timestamps (detected, triaged, assigned, remediated, verified).
- Tickets/changes linked to high-risk findings and proof of completion.
- Rescan or verification evidence demonstrating closure.
Exception handling
- Approved risk acceptance records with compensating controls and review dates.
- Documentation of patch constraints for specific environments (example: operational technology windows).
Reporting
- Recurring operational reports to management showing progress and overdue items.
Common exam/audit questions and hangups
Assessors commonly probe these areas under VDA ISA 8.3.1 (VDA ISA Catalog v6.0):
- “Show me your last scans. How do you know coverage is complete?”
- “How do you prioritize vulnerabilities beyond scanner severity?”
- “What are your patch timelines, and where are they documented?”
- “Pick a critical finding from last month. Walk me from detection to closure.”
- “Where do exceptions live, and who approves them?”
- “How do you ensure third-party managed systems are patched or otherwise addressed?”
Typical hangup: teams show a patch policy but cannot show closure verification (rescans, logs, or status tracking).
Frequent implementation mistakes and how to avoid them
- One-time scanning before the assessment. Fix: publish a scan calendar and retain historical outputs.
- No asset-based accountability. Fix: assign remediation owners by asset class and enforce ticket assignment rules.
- Severity-only prioritization. Fix: add exposure and asset criticality to your triage rubric and document it.
- Patching without verification. Fix: require rescan or patch verification evidence before closure.
- Exception sprawl. Fix: require expirations, compensating controls, and periodic re-approval.
- Ignoring third-party operated components. Fix: include contractual expectations and operational reporting for systems the third party administers, then collect proof.
Enforcement context and risk implications
No public enforcement cases are provided in the source catalog for this requirement. Practically, weak vulnerability management increases the likelihood that known vulnerabilities remain exploitable, which raises incident risk and can cascade into assessment findings across access control, incident response, and third-party oversight. For TISAX, the immediate business risk is assessment nonconformance or scope limitations that affect customer trust and contracting.
A practical 30/60/90-day execution plan
First 30 days (Immediate stabilization)
- Confirm in-scope asset classes and produce an initial coverage map.
- Document a vulnerability management procedure aligned to scanning, prioritization, and patch timelines (VDA ISA Catalog v6.0).
- Stand up a system of record for findings and link to ticketing.
- Run baseline scans for key environments and establish initial backlog.
By 60 days (Operational control)
- Implement triage and prioritization rubric; train remediation owners.
- Set internal patch timelines by risk tier; integrate with change workflows.
- Start weekly or regular reporting to security governance (backlog, overdue, exceptions).
- Implement exception workflow with approvals and review triggers.
By 90 days (Audit-ready execution)
- Demonstrate repeatability: multiple scan cycles with tracked remediation and verification evidence.
- Validate coverage: reconcile inventory vs scanned assets; resolve gaps.
- Test the workflow on a sample: take a high-risk finding from detection through closure with full artifacts.
- Formalize third-party touchpoints: require remediation status reporting for externally managed systems and store it with your evidence.
Frequently Asked Questions
Do we need authenticated scanning to meet VDA ISA 8.3.1?
VDA ISA 8.3.1 requires regular scanning but does not prescribe a specific technique (VDA ISA Catalog v6.0). Use a mix that provides meaningful coverage for your environment, and document why you chose it.
What counts as “timely patching”?
The requirement calls for timely patching with defined timelines you can follow and prove (VDA ISA Catalog v6.0). Set internal SLAs by risk tier, then show evidence you meet them or manage exceptions through approval and compensating controls.
How do we handle vulnerabilities where a patch is not available?
Track the item like any other finding, then remediate through configuration changes, mitigations, or compensating controls with an exception record if risk remains. Auditors look for tracking and decision discipline, not perfection.
Are cloud and container images in scope?
If you run workloads or services in cloud environments, vulnerability management should cover those assets as part of “all systems” in your program scope (VDA ISA Catalog v6.0). Define how you scan base images, hosts, and externally exposed services, then retain results and remediation records.
How should we treat third-party managed infrastructure?
If a third party operates systems for you, you still need a process that ensures vulnerabilities are found, prioritized, and remediated, with proof retained. Build reporting and evidence obligations into the relationship and store their remediation attestations and relevant reports with your audit artifacts.
What evidence is most persuasive in a TISAX assessment?
A short trail that shows end-to-end execution: scan output → triage/prioritization → ticket/change → patch/mitigation → rescan verification → closure in the system of record. Pair it with your written procedure and exception approvals (VDA ISA Catalog v6.0).
Frequently Asked Questions
Do we need authenticated scanning to meet VDA ISA 8.3.1?
VDA ISA 8.3.1 requires regular scanning but does not prescribe a specific technique (VDA ISA Catalog v6.0). Use a mix that provides meaningful coverage for your environment, and document why you chose it.
What counts as “timely patching”?
The requirement calls for timely patching with defined timelines you can follow and prove (VDA ISA Catalog v6.0). Set internal SLAs by risk tier, then show evidence you meet them or manage exceptions through approval and compensating controls.
How do we handle vulnerabilities where a patch is not available?
Track the item like any other finding, then remediate through configuration changes, mitigations, or compensating controls with an exception record if risk remains. Auditors look for tracking and decision discipline, not perfection.
Are cloud and container images in scope?
If you run workloads or services in cloud environments, vulnerability management should cover those assets as part of “all systems” in your program scope (VDA ISA Catalog v6.0). Define how you scan base images, hosts, and externally exposed services, then retain results and remediation records.
How should we treat third-party managed infrastructure?
If a third party operates systems for you, you still need a process that ensures vulnerabilities are found, prioritized, and remediated, with proof retained. Build reporting and evidence obligations into the relationship and store their remediation attestations and relevant reports with your audit artifacts.
What evidence is most persuasive in a TISAX assessment?
A short trail that shows end-to-end execution: scan output → triage/prioritization → ticket/change → patch/mitigation → rescan verification → closure in the system of record. Pair it with your written procedure and exception approvals (VDA ISA Catalog v6.0).
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream