Why Prioritize vulnerability? A case for Risk and Contextual-based prioritization for application security and Cloud Security

AppSec Phoenix Risk Based Context Based Priorities in application security and cloud security

AppSec Phoenix Risk Based Context Based Priorities in application security and cloud security
AppSec Phoenix Risk Based Context Based Priorities in application security and cloud security.

Vulnerabilities have been increasing in number year on year, precisely 34%, according to MITRE CVE statistics. 

FIRST/CVE

There is no secret that the complexity of vulnerability for cloud and application security is increasing consistently.

The speed at which modern organizations are building applications and security teams are catching up to them is increasing.

I recently talked at the open security summit about how much pressure is increasing. 

It comes as no shock that 54% of application security and cloud security professionals have considered changing jobs or industries in the last few years

(CxO online)

Increased Complexity in Application Security and Cloud security leads to more skill shortage.

Among those challenging times, there is a well-known acute cybersecurity shortage. On top of the shortage being in cloud security space and application security space. 

It is no surprise since those two spaces are probably more complex to grasp for newcomers. 

Effects of cybersecurity skills shortage worsening, new study says

Credit Tech Target, 

On the other hand, new vulnerabilities are getting published, and cloud and applications are increasing, with covid being the main driver of remote and digital assets. 

96% of leaders report Covid-19 will accelerate their digital transformation by an average of 5.3 years

63% of leaders state that the Covid-19 pandemic prompted them to embrace digital transformation sooner than originally planned

(IBM)(Celerity)

And the numbers of those are going to increase consistently due to the increased workload additional complexity.

Effects of cybersecurity skills shortage worsening, new study says

Credit Tech Target 

So what are the other factors of those shortages?

  • Increase the number of vulnerabilities
  • Increased complexity of applications and where they are deployed
  • Incident response techniques are still very much manual and focus on antiquated playbooks
  • Increased Complexity
  • Decreased time to release
  • New workforce and reshuffle 

We recently wrote a whitepaper that expands on this problem, following some considerations on the subject https://phoenix.security/whitepapers-resources/whitepaper-vulnerability-management-in-application-cloud-security/

Focus and balance on Vulnerabilities that matters most in Application Security and Cloud Security

What is the solution to all this? 

Focus and balance

Focus on what’s exploitable and risk-based prioritization of vulnerabilities are the key to partially addressing skill shortage and reducing burnout. Helping an organization’s security team to scale betters enables them to dedicate more time to better new security professionals, convert and upskill developers, and prevent burnout by triage.  

Ballance between what’s built and what’s fixed because fixing security issues at the end of a cycle requires 10X more effort than when new application security and cloud security vulnerabilities are discovered.

Context-based risk assessment – focusing on all the vulnerabilities published is simply impossible and not practical. 

A small number of Application security/ Infrastructure Security / Cloud Security vulnerabilities are exploitable
A small number of Application security/ Infrastructure Security / Cloud Security vulnerabilities are exploitable

70% of developers skip security steps because there are simply too many vulnerabilities to fix, and only 10-14% Percent of those vulnerabilities do need attention right away

Fixing a vulnerability that is potentially bad on an external website or any server linked to an externally facing server is much more critical than one fully internal and does not host critical data. 

Contextual Prioritization and Risk-based prioritization

Luckily there is a methodology that helps convey vulnerability “severity” in the contextual aspect 

Risk = Probability (Likelihood of exploitation, Locality)  * Severity * Impact 

Risk Based Application Security and Cloud Security Prioritization factors
Application Security and Cloud Security Prioritization

Contextual aspects are based on:

  • The severity of a vulnerability – how much a 3rd party vendor has declared that vulnerability to potentially be dangerous
  • Probability of exploitation – how likely is that vulnerability to be exploited
  • The locality is a factor in the probability of exploitation 
  • Impact (also known as a factor of the Business Impact Assessment) communicate how much damage a vulnerability could cause to the organisation

Risk-based threat assessment is usually done by security professionals. Still, this result in an overwhelming job as the factors that need to be considered is simply too many and vary too quickly. 

A topography of IT components in a typical enterprise with many vulnerabilities to consider in application security and cloud security

Following is a list of elements security professionals need to consider when triaging and deciding which vulnerabilities to fix first :

  • How an application is being built
  • Where it is deployed (which network, which environment) 
  • What kind of data does the application process
  • How many of the components are external, Internal or connected to those
  • What are the vulnerabilities of the code, libraries and API that the application is building
  • Where are the encryption keys stored? Are there any misconfigurations in the storage system 
  • Is any of the systems where the application is being deployed vulnerable or has it become vulnerable
  • Is any of the software in the system where the application is being deployed
  • Is there any threat actor group targeting a specific vulnerability/system
  • What is the blast radius if one of those components gets compromised

The complexity of this scenario increase when we consider the speed of deployment, where some of the environments get modified 100 times per day. Not all those deployments will lead to a potential compromise or misconfiguration, but some might. 

Risk cannot be completely avoided. Organisations need to choose where to apply efforts to reduce risk. Cybersecurity risk management (RM) helps enterprises decide what systems and information to prioritise or tolerate.

Polemon Institute application security professionals vs developers
Polemon Institute application security professionals vs developers

Security professionals can’t be scaled infinitely, and more developers are being produced than security researchers.

Scaling security in a traditional organization is challenging. It requires automation and selection of vulnerabilities and misconfiguration to fix application security and cloud security that matches the development team’s speed of deployment and growth.

A solution that triages automatically and proposes what to mitigate needs to consider

Probability of exploitation

  • The severity of a vulnerability (CVE, CWE, CVSS and CWSS)
  • The locality of an asset, also known as Context
  • Exploitability of a vulnerability based on the availability of Proof of concept or code snippet
  • Probability of an attacker targeting the vulnerability
  • Active exploitation of the vulnerability from threat actors groups 
  • Discussion on Twitter, Linkedin, Reddit and other forums
  • How recent is the vulnerability (in the first 40 days, vulnerabilities are exploited/targeted more frequently) 

Impact on system

  • What data
  • How many users
  • How much revenue could be impacted 
  • Contractual impact
  • Brand image damage 

We recently wrote a whitepaper  that expands on this problem https://phoenix.security/whitepapers-resources/whitepaper-vulnerability-management-in-application-cloud-security/ 

How to set targets

Service Level Objectives/Agreements are not a solution but an aid to setting targets for teams but can be an aid if there is nothing else.

Expanding on the subject here would be too extensive; we wrote several whitepapers and articles on the subject;

In conclusion, targets based on risk are much more precise and variable.

Additional Information is available in the article on SLA, SLA and OKR”

For more details on how to set metrics, there is another article that expands on the subject: https://phoenix.security/vulnerability-infrastructure-and-application-security-sla-slo-okr-do-they-matter/ 

We are publishing another whitepaper on SLA:
https://phoenix.security/whitepapers-resources/data-driven-vulnerability-managementre-sla-slo-dead/ 

Conclusion

Ultimately CVE and CVSS are a good starting point. Still, with only 10-14% being targeted at a particular time, the security and development teams need to focus on which is more likely to be exploited. 

Freeing security professionals from data analysis and triaging enables them to focus on skill training of the development team, triaging the most critical vulnerabilities. 

Security professionals can also spot interconnections between systems better than machines and correlate procedure violations.

Also, freer security professionals can propose mitigation strategies for vulnerabilities like compensating controls and upgrades of systems that normally no AI or tool would be able to determine. 

On the flip side, technology is now much more capable of correlating a high number of data sources at scales and AI models like decision trees, neural networks, and Random Forest classifiers. Most importantly, Elastic-net models trained with gradient boosting can quickly digest a lot of data. 

Prediction models based on technology like Phoenix Security can process trillions of data sources and dynamic context and convert them into risk. This frees security professionals and enables them to focus on the most important vulnerabilities.

Francesco is an internationally renowned public speaker, with multiple interviews in high-profile publications (eg. Forbes), and an author of numerous books and articles, who utilises his platform to evangelize the importance of Cloud security and cutting-edge technologies on a global scale.

Discuss this blog with our community on Slack

Join our AppSec Phoenix community on Slack to discuss this blog and other news with our professional security team

From our Blog

The team at Phoenix Security pleased to bring you another set of new application security (ASPM) features and improvements for vulnerability management across application and cloud security engines. This release builds on top of previous releases with key additions and progress across multiple areas of the platform. Application Security Posture Management (ASPM) Enhancements • New Weighted Asset Risk Formula – Refined risk aggregation for tailored vulnerability management. • Auto-Approval of Risk Exceptions – Accelerate mitigation by automating security approvals. • Enhanced Risk Explorer & Business Unit Insights – Monitor and analyze risk exposure by business units for better prioritization. Vulnerability & Asset Management • Link Findings to Existing Tickets – Seamless GitHub, ServiceNow, and Azure DevOps integration. • Multi-Finding Ticketing for ADO – Group multiple vulnerabilities in a single ticket for better workflow management. • Filter by Business Unit, CWE, Ownership, and Deployment Environment – Target vulnerabilities with precision using advanced filtering. Cyber Threat Intelligence & Security Enhancements • Cyber Threat Intelligence Premium – Access 128,000+ exploits for better exploitability and fixability metrics. • SBOM, Container SBOM & Open Source Artifact Analysis – Conduct deep security analysis with reachability insights. • Enhanced Lacework Container Management – Fetch and analyze running container details for better security reporting. • REST API Enhancements – Use asset tags for automated deployments and streamline security processes. Other Key Updates • CVE & CWE Columns Added – Compare vulnerabilities more effectively. • Custom Status Management for Findings – Personalize security workflows with custom status configurations. • Impact & Risk Explorer Side Panel – Gain heatmap-based insights into vulnerability distribution and team risk impact. 🚀 Stay ahead of vulnerabilities, optimize risk assessment, and enhance security efficiency with Phoenix Security’s latest features! 🚀
Alfonso Eusebio
Discover CVE-2025-30066 tj-actions/changed-files GitHub Action has been compromised, exposing secrets in CI/CD pipelines and posing a major software supply chain security risk. Attackers injected malicious code into all versions (V1–V45), repointing existing tags to a compromised commit that exfiltrated credentials via GitHub Actions logs. Immediate remediation is required—organizations must scan their repositories, rotate secrets, and replace the action to mitigate risk. Learn how Phoenix Security’s ASPM can automate threat detection and enhance GitHub Actions security.
Francesco Cipollone
Tired of scrambling every time a new zero-day hits the headlines? Discover a threat-centric approach to vulnerability management that tackles root causes head-on. Dive into real-world examples—like the notorious Log4j (CVE-2021-44228)—and learn how ASPM application security, cybersecurity best practices, and frameworks (CVE → CWE → CAPEC → MITRE ATT&CK) can streamline remediation. Whether it’s ransomware or unauthorized access attempts on QNAP devices, see how focusing on broad threat categories and root cause analysis can supercharge your defense strategy and minimize patch fatigue.
Francesco Cipollone
ClearBank broke a 250-year banking tradition by becoming the UK’s first new clearing bank in centuries—a bold move that extends to their approach to cybersecurity. In partnership with Phoenix Security, ClearBank has pioneered advanced Application Security Posture Management (ASPM) techniques that go beyond merely identifying vulnerabilities. By focusing on root causes, defense in depth, and real-world context—like which services are mission-critical or shielded by a WAF—their teams prioritize what truly matters. Neil Reed, Principal AppSec Engineer, underscores the importance of targeted remediation, using Phoenix’s exception engine to intelligently downgrade or reclassify findings that pose minimal risk. This risk-based strategy is a game-changer in scaling security without overburdening engineering teams. By running structured remediation campaigns and cutting container noise by up to 91%, ClearBank’s DevSecOps workflow has evolved to be both agile and robust. Their forward-thinking stance shows how the right blend of technology, context, and collaboration can fortify an organization, keeping pace with shifting regulations and emerging threats.
Neil Reed
EPSS V4 arrives March 17 with new insights on real-world exploit likelihood. Preliminary data shows moderate score shifts, though outliers exist, including a puzzling jump for CVE-2007-4559. Binned distributions reveal minimal changes near the lower end, often tied to unverified exploits, while bug bounty activity and threat feeds help validate higher-risk flaws. Ransomware campaigns frequently target vulnerabilities with high EPSS scores, reminding security teams that a single metric rarely provides the full picture. ASPM, application security reviews, and ongoing remediation efforts round out a more comprehensive approach. This holistic method considers bug bounty reports, active scanning, and real-time intel, ensuring that unknown zero-day threats are not overlooked.
Francesco Cipollone
Executives often pose one question: “Who owns this risk, and how extensive is it?” Phoenix Security addresses that challenge with Blast Radius Analysis and Business Unit Impact Analysis. These features bring clarity to ASPM initiatives, highlight shared vulnerabilities like Log4j, and offer a path to deeper root cause discoveries. Experience streamlined accountability, minimized patch cycles, and a stronger cybersecurity posture—all in one platform.- Mapping of vulnerabilities to Installed Software – Find Assets/Vulns by Scanner – Detailed findings Location information Risk-based Posture Management – Risk and Risk Magnitude for Assets – Filter assets and vulnerabilities by source scanner Integrations – BurpSuite XML Import – Assessment Import API Other Improvements – Improved multi-selection in filters – New CVSS Score column in Vulnerabilities
Alfonso Eusebio
Derek

Derek Fisher

Head of product security at a global fintech

Derek Fisher – Head of product security at a global fintech. Speaker, instructor, and author in application security.

Derek is an award winning author of a children’s book series in cybersecurity as well as the author of “The Application Security Handbook.” He is a university instructor at Temple University where he teaches software development security to undergraduate and graduate students. He is a speaker on topics in the cybersecurity space and has led teams, large and small, at organizations in the healthcare and financial industries. He has built and matured information security teams as well as implemented organizational information security strategies to reduce the organizations risk.

Derek got his start in the hardware engineering space where he learned about designing circuits and building assemblies for commercial and military applications. He later pursued a computer science degree in order to advance a career in software development. This is where Derek was introduced to cybersecurity and soon caught the bug. He found a mentor to help him grow in cybersecurity and then pursued a graduate degree in the subject.

Since then Derek has worked in the product security space as an architect and leader. He has led teams to deliver more secure software in organizations from multiple industries. His focus has been to raise the security awareness of the engineering organization while maintaining a practice of secure code development, delivery, and operations.

In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

Jeevan Singh

Jeevan Singh

Founder of Manicode Security

Jeevan Singh is the Director of Security Engineering at Rippling, with a background spanning various Engineering and Security leadership roles over the course of his career. He’s dedicated to the integration of security practices into software development, working to create a security-aware culture within organizations and imparting security best practices to the team.
In his role, Jeevan handles a range of tasks, from architecting security solutions to collaborating with Engineering Leadership to address security vulnerabilities at scale and embed security into the fabric of the organization.

James

James Berthoty

Founder of Latio Tech

James Berthoty has over ten years of experience across product and security domains. He founded Latio Tech to help companies find the right security tools for their needs without vendor bias.

christophe

Christophe Parisel

Senior Cloud Security Architect

Senior Cloud Security Architect

Chris

Chris Romeo

Co-Founder
Security Journey

Chris Romeo is a leading voice and thinker in application security, threat modeling, and security champions and the CEO of Devici and General Partner at Kerr Ventures. Chris hosts the award-winning “Application Security Podcast,” “The Security Table,” and “The Threat Modeling Podcast” and is a highly rated industry speaker and trainer, featured at the RSA Conference, the AppSec Village @ DefCon, OWASP Global AppSec, ISC2 Security Congress, InfoSec World and All Day DevOps. Chris founded Security Journey, a security education company, leading to an exit in 2022. Chris was the Chief Security Advocate at Cisco, spreading security knowledge through education and champion programs. Chris has twenty-six years of security experience, holding positions across the gamut, including application security, security engineering, incident response, and various Executive roles. Chris holds the CISSP and CSSLP certifications.

jim

Jim Manico

Founder of Manicode Security

Jim Manico is the founder of Manicode Security, where he trains software developers on secure coding and security engineering. Jim is also the founder of Brakeman Security, Inc. and an investor/advisor for Signal Sciences. He is the author of Iron-Clad Java: Building Secure Web Applications (McGraw-Hill), a frequent speaker on secure software practices, and a member of the JavaOne Rockstar speaker community. Jim is also a volunteer for and former board member of the OWASP foundation.

Join our Mailing list!

Get all the latest news, exclusive deals, and feature updates.

The IKIGAI concept
x  Powerful Protection for WordPress, from Shield Security
This Site Is Protected By
ShieldPRO