06. 10. 2025 Beatrice Dall'Omo Red Team, SEC4U

Vulnerability Trends & Metrics: Monthly Company Report

Effective Vulnerability Management does not end with detection, it ends with action. And to take the right action, you need clear, accurate, and timely reports. In today’s fast-moving threat landscape, reporting is not just a formality, it’s a critical bridge between scan data and strategic security decisions.

This article explores the role of reporting within the Vulnerability Management life-cycle, highlighting how well-structured reports can support prioritization, accountability, compliance, and communication across technical and non-technical teams. Whether you’re securing a small environment or managing enterprise-level infrastructure, understanding how to create and effectively use vulnerability reports is fundamental to reducing risk and strengthening your security posture.

To support this, we have developed a reporting process focused on aggregating and analyzing enriched vulnerability data produced from the enrichment process implemented at first. By correlating raw findings with threat intelligence, dynamic risk (KEV, EPSS), exploitability and public exposure, we have created reports providing to Business Partner of the Würth Group a comprehensive view of their situation regarding issues and vulnerability.

This article outlines how each report for each Business Partner was implemented, what metrics and trends it highlights, and how it helps drive more informed decisions.

Report Overview: Structure and Content

A well-structured vulnerability report is more than just a list of findings, it’s a communication tool that helps translate technical issues into actionable insights.
In addition to technical details, the reports include aggregated data and trend analysis, offering a high-level view of the organization’s security posture and helping to identify which areas or assets require the most attention.
In the following paragraphs, we’ll break down the main sections and explain how each contributes to the overall goal of reducing security risk.

The company reports are created starting from data placed in the Elastic instance. Using KQL and ES|QL queries the data of interest are extracted to create reports that are then shared monthly with the related Business Partner.

After an initial introduction section regarding the process, how the Remediation Priority Index is calculated and the Objective and Use Cases of the report, other sections continue containing tables, histograms, and pie charts. These allow to visually show trends of vulnerabilities, both public and private, over the past months. Additional details have been reported for those vulnerability that, after the enrichment, have been assigned with a critical Remediation Priority Index.

Later sections of the report delve into more specific areas, including a breakdown of the most frequently observed CVEs, an overview of the systems most heavily impacted along with an assessment of their potential public exposure and a review of the operating systems in use. Particular attention is for those systems that are either reaching end-of-life (EOL) or are externally accessible.

An example is the pie chart below along with the table: the chart shows the distribution of the various operating systems detected, while the table contains details on each, highlighting whether it is an operating system reaching EOL and whether it is exposed to the public. This helps to better identify the systems that need more attention.

These deeper analysis helps prioritize remediation efforts by highlighting the most critical vulnerabilities and the assets that represent the highest risk.

Building Awareness, Achieving Results

This report has several objectives, including fostering a broader understanding of the Vulnerability Management process and encouraging a shift in mindset, from viewing remediation as a one-time activity to embracing it as a continuous, structured process. By providing clear insights and actionable data, the report aims to support informed decision-making, enabling more efficient remediation efforts and minimizing the time window for potential vulnerability exploitation.

During these first runs we have received a significant amount of feedback from end users. This is not only a positive indicator of engagement, but also a sign of growing awareness and commitment to security across Business Partners.

We take this feedback seriously and are continuously working to enhance the value of the reports. From month to month, we are introducing explanations, clearer descriptions, additional data, and new sections. All designed to make the reports more accessible, actionable, and aligned with our Business Partners’ evolving needs.

Ultimately, our aim is to ensure that these reports serve not only as a snapshot of current vulnerabilities, but as a practical tool to guide prioritization, support remediation efforts, and strengthen overall security posture by proactively reduce risk.

Beatrice Dall'Omo

Beatrice Dall'Omo

Red Team & Offensive Security Specialist | Cybersecurity Team | Würth Phoenix

Author

Beatrice Dall'Omo

Red Team & Offensive Security Specialist | Cybersecurity Team | Würth Phoenix

Leave a Reply

Your email address will not be published. Required fields are marked *

Archive