top of page

Vulnerability Management (SBOM, CVE)


Vulnerability management is a core element of modern cybersecurity strategies. It encompasses all processes involved in identifying, assessing, prioritizing, and remediating security vulnerabilities in software and hardware. The goal is to detect and eliminate known weaknesses early—before they can be exploited by attackers.

A key tool in this process is the Software Bill of Materials (SBOM), which provides a structured list of all components, libraries, and dependencies included in a software product. With a complete SBOM, affected systems can be quickly identified when new vulnerabilities—such as those listed as Common Vulnerabilities and Exposures (CVEs)—are disclosed.

CVE is an internationally recognized system for cataloging publicly known security vulnerabilities. Each CVE entry receives a unique identifier and describes a specific vulnerability, which is rated for severity using the Common Vulnerability Scoring System (CVSS). This enables organizations to automatically check whether their systems are affected and respond promptly.

Effective vulnerability management includes:

·        Continuous inventory of IT components

·        Automated vulnerability scans

·        Risk-based prioritization

·        Patch management and update processes

·        Documentation and reporting

Given the increasing complexity of software and the evolving threat landscape, vulnerability management is indispensable. It not only supports compliance with regulatory requirements, but also serves as a foundation for certified security standards such as ISO/IEC 27001 and the implementation of frameworks like the Cyber Resilience Act (CRA) or the NIS2 Directive.

bottom of page