Remediation, Compensating Controls, and Risk-Based Decisions

Key Takeaways

  • Remediation removes or fixes a vulnerability; mitigation reduces likelihood or impact; a compensating control reduces risk when the preferred control is not feasible.
  • Risk-based decisions consider asset value, exposure, exploitability, operational impact, available controls, and business deadlines.
  • Exceptions should be documented, approved by the risk owner, time-bound, and reviewed before expiration.
  • Compensating controls such as segmentation, monitoring, WAF rules, or access restrictions are useful but should be matched to the risk.
  • Verification is required: a ticket marked complete is not the same as a validated fix.
Last updated: April 2026

Remediation, Compensating Controls, and Risk-Based Decisions

The exam often asks for the best action when the ideal fix is not immediately possible. Separate the concepts:

TermMeaningExample
RemediationFix or remove the weaknessInstall patch, remove public access
MitigationReduce likelihood or impactAdd rate limiting, restrict source IPs
Compensating controlAlternative control when primary control is not feasibleSegment unsupported system until replacement
Risk acceptanceBusiness owner approves residual riskTime-bound exception for a legacy app
Risk avoidanceStop the risky activityShut down unused exposed service
Risk transferShift financial or contractual impactInsurance or vendor indemnity

Selecting a Control

SituationBest practical response
Patch exists and change risk is lowPatch through normal or emergency process
Patch exists but outage window is requiredUse temporary controls, schedule patch, track due date
No patch existsApply workaround, restrict exposure, monitor, follow vendor guidance
System is end-of-lifeReplace or upgrade; segment and monitor temporarily
Business must keep vulnerable app brieflyDocument exception, add compensating controls, set expiration
Exploitation is activeContain exposure immediately, then eradicate and recover

Compensating Control Examples

RiskCompensating controls
Legacy server cannot be patched for 30 daysNetwork segmentation, allow-list access, EDR monitoring, increased logging
Vulnerable web endpoint awaiting code fixWAF virtual patch, rate limiting, monitoring, expedited release
Admin interface needed by remote teamVPN or ZTNA, MFA, source restrictions, session logging
Weak third-party integrationScope API token, monitor usage, contractual remediation date

Compensating controls should be specific. "Monitor it" is weak if nobody defines what to monitor, where alerts go, and what action follows.

Worked Decision Example

A medical scheduling server uses an unsupported operating system. Replacement is funded and scheduled in 45 days, but the system must remain online. The best answer is not to ignore the risk. A practical plan could include:

StepReason
Restrict network access to only required application pathsReduces exposure
Remove local admin rights and unused servicesReduces attack surface
Increase logging and EDR coverageImproves detection
Document a time-bound exception approved by the risk ownerMakes residual risk explicit
Track replacement as the final remediationRemoves the unsupported platform risk

Verification and Closure

Claimed fixVerification method
Patch installedCredentialed rescan or package/version validation
Public storage removedPolicy review and anonymous access test
Firewall rule tightenedConfig review and connection test
Secret rotatedConfirm old key fails and new key is stored correctly
Vulnerable code fixedCode review, test case, DAST/SAST as appropriate

Common Traps

TrapBetter exam reasoning
Accept risk without owner approvalResidual risk acceptance belongs to the right business or risk owner
Leave compensating controls foreverExceptions should expire or be reviewed
Close tickets without verificationValidate with evidence
Pick the most disruptive option by defaultBalance risk reduction with business impact
Use one generic control for every vulnerabilityMatch control to attack path and weakness

Quick Drill

Choose the response:

  1. Critical patch for internet-facing gateway, exploit active: emergency patch or vendor workaround immediately, with containment as needed.
  2. Legacy internal app cannot be patched for 20 days: segment, restrict access, monitor, document exception, schedule remediation.
  3. Public bucket exposed confidential data: remove public access, investigate access logs, rotate exposed secrets if any, notify according to policy.
  4. Scanner says "fixed" but no validation exists: rescan or perform a targeted verification before closure.
Test Your Knowledge

A legacy system cannot be patched for 30 days but must remain online. Which approach is most appropriate?

A
B
C
D
Test Your Knowledge

After a team claims a firewall rule was tightened, what should happen before closing the vulnerability ticket?

A
B
C
D
Test Your KnowledgeMulti-Select

Which are valid compensating controls for an unpatchable legacy server? Select two.

Select all that apply

Network segmentation
Enhanced monitoring
Anonymous public access
Shared administrator password