VAPT Findings Register

61% VAPT Finding Recurrence: Why Your Vulnerability Register Is Failing and How to Fix Closure Tracking

Most organizations conduct VAPT assessments quarterly as mandated by SEBI and RBI. But without structured closure tracking, 61% of findings recur across assessment cycles โ€” creating a costly loop of discovery without remediation that auditors and regulators increasingly penalize.

๐Ÿ“– 12 min read VAPT Vulnerability Management ๐Ÿ”‘ 61% Recurrence Rate
61%
VAPT findings recurring across cycles
45d
Average critical finding closure time
3.2x
Cost multiplier for recurring vs new findings
78%
Organizations with no SLA-tracked remediation

The VAPT Recurrence Trap

Every quarter, thousands of Indian organizations dutifully conduct Vulnerability Assessment and Penetration Testing (VAPT) โ€” as required by SEBI CSCRF (DE.2), RBI cybersecurity framework, and ISO 27001 (A.8.8). The VAPT vendor delivers a report. The security team reviews it. Findings are logged. And then... the pipeline breaks.

Analysis of VAPT findings across 150 Indian organizations over 4 consecutive assessment cycles reveals a disturbing pattern: 61% of findings identified in one cycle reappear in the next. Critical and high-severity findings fare only slightly better at 48% recurrence โ€” meaning nearly half of your most dangerous vulnerabilities survive from one assessment to the next.

This isn't a testing problem โ€” it's a closure tracking problem. Organizations invest โ‚น3-8L per quarterly VAPT engagement but have no structured mechanism to ensure findings actually get remediated. The result is a growing backlog of known vulnerabilities that represent both security risk and regulatory non-compliance.

Why Findings Recur: The Five Root Causes

Root Causes of VAPT Finding Recurrence
No ownership assigned
72%
No remediation SLA
78%
Finding lost in email
55%
Risk accepted without doc
41%
Remediation undone by change
23%

The Regulatory Lens: What Auditors Look For

Regulators and auditors have evolved their VAPT assessment approach. They no longer just verify that VAPT was conducted โ€” they verify that findings were closed or formally risk-accepted. Specific expectations:

SEBI CSCRF DE.2: Vulnerability Management

SEBI expects: regular VAPT execution (quarterly for critical systems), findings classification by severity, remediation within defined SLAs (30 days for critical, 60 for high, 90 for medium), evidence of closure or formal risk acceptance with management approval, and trend analysis showing decreasing vulnerability count over time.

RBI Cybersecurity Framework

RBI expects: VAPT by CERT-In empaneled auditors, findings reported to the Board/IT Committee, remediation tracking with board visibility, and recurring findings flagged as governance weakness.

ISO 27001 A.8.8: Management of Technical Vulnerabilities

Auditors verify: defined vulnerability management process, risk assessment of discovered vulnerabilities, timely remediation or risk treatment, and evidence of process effectiveness (reduced recurrence over time).

"An auditor told me: 'I don't care about the VAPT report itself. Show me your findings register, your SLA compliance rate, and your recurrence trend. That tells me whether you actually manage vulnerabilities or just discover them.'"

โ€” IT Head, SEBI-Regulated Market Infrastructure Institution

Building a Findings Register That Drives Closure

The findings register is the central artifact that transforms VAPT from a compliance checkbox into a security improvement engine. Here's how to build one:

Finding Record Structure

Each finding in the register must capture:

SLA Tiers: Severity-Based Remediation Timelines

Remediation Workflow

  1. Intake: VAPT findings imported into register within 48 hours of report receipt
  2. Triage: Each finding assessed for severity accuracy, asset criticality, and exploitability. Ownership assigned
  3. Planning: Remediation owner creates action plan within 5 business days. Plan reviewed by security team
  4. Implementation: Fix applied per plan. Change management process followed for production changes
  5. Verification: Finding re-tested (targeted re-test, not full VAPT). Re-test evidence captured
  6. Closure: Finding closed in register with evidence. Status visible in dashboard

Before: VAPT Report Shelf

  • VAPT reports filed on SharePoint, never tracked
  • Findings communicated via email to "IT team"
  • No individual ownership for remediation
  • No SLA, no escalation, no accountability
  • Same findings discovered every quarter
  • Auditors flag "ineffective vulnerability management"

After: Findings-to-Closure Pipeline

  • Every finding has a unique ID and register entry
  • Named owner with SLA and escalation path
  • Weekly SLA compliance dashboard visible to CISO
  • Risk acceptance requires formal approval and documentation
  • Recurrence tracking with systemic root cause analysis
  • Auditors see declining trend and SLA compliance >85%

Breaking the Recurrence Cycle

Reducing the 61% recurrence rate requires addressing the root causes, not just the symptoms:

Root Cause 1: Configuration Drift

Findings recur because the fix is undone by subsequent changes. The solution: tie vulnerability remediation to configuration management baselines. When a vulnerability is closed by a configuration change, that configuration becomes part of the enforced baseline. Any drift is detected and flagged.

Root Cause 2: Incomplete Remediation

A finding is "closed" on one system but the same vulnerability exists on other systems. The solution: when a finding is discovered, scope the remediation across all affected assets, not just the tested system. Use vulnerability scanners to validate closure across the estate.

Root Cause 3: Knowledge Loss

The person who fixed the vulnerability leaves, and the next team member doesn't understand the fix or why it matters. The solution: document the remediation in the findings register with enough detail that anyone can verify and maintain the fix.

Board Investment Case: VAPT Closure Tracking

Annual VAPT spend (4 quarterly cycles)โ‚น12-32L
Findings remediated per cycle (current)~39% (61% recurrence)
Findings remediated per cycle (target)>85%
Cost of recurring critical finding (risk exposure)โ‚น25L-1Cr per occurrence
Closure tracking system investmentโ‚น2-5L annual
ROI at 50% recurrence reduction5-20x per quarter

VAPT Findings Register โ€” Practitioner Toolkit

Import VAPT findings, assign ownership with SLA tracking, manage remediation workflows, track recurrence patterns, and generate audit-ready vulnerability management reports aligned to SEBI CSCRF and ISO 27001 requirements.

View All 11 Tools โ†’