0

Stop the Chaos

hackuity.io

From SOC to VOC: Why Vulnerability Management Needs Its Own Operating Model

Author
Pierre Samson

The Vulnerability Operations Center isn't just new terminology for the same old approach. It's recognition that vulnerability management has evolved into its own discipline—one that requires dedicated focus, systematic processes, clear metrics, and proper governance.

A mature VOC stands on three core pillars that directly mirror how epidemiology approaches population health.

1. Intelligence-Driven Prioritization
Not all vulnerabilities pose equal risk. A VOC identifies the actual unlocked doors and open windows in your environment: the specific exposures that are genuinely exploitable and relevant to your critical assets. The goal isn't cataloging every theoretical weakness your scanners can find. It's systematically eliminating the vulnerabilities that attackers will realistically use against you.

Like epidemiology, it's about identifying where intervention will have the highest impact, not treating every possible case with equal urgency.

2. Cross-Team Remediation Orchestration
Fixing vulnerabilities is almost neverva security-only task. It requires sustained coordination with infrastructure teams, cloud operations, DevOps, application developers, and often business stakeholders who need to understand the trade-offs.

A VOC builds the structured ownership, clear workflows, and accountability mechanisms that make remediation happen systematically rather than reactively. Think of it like contact tracing and intervention protocols in public health: clear processes that ensure exposure actually gets reduced at scale, not just identified and reported into a backlog that nobody owns.

3. Risk-Based Performance Measurement

Patch counts and SLA compliance percentages are easy to measure, but they don't necessarily tell you whether your actual exposure is decreasing.

A VOC tracks what matters: reduction of exploitable attack surface, time-to-remediate for critical exposures, recurrence patterns that indicate systemic weaknesses, and risk trends over time. The objective isn't demonstrating activity. The objective is proving measurable risk reduction

Just as epidemiologists track infection rates and transmission dynamics rather than simply counting how many tests got administered, a VOC measures outcomes that actually indicate whether your organization is becoming more secure.

Your team found 5,000 vulnerabilities last quarter. How many did you actually fix?

If the answer makes you slightly uncomfortable, you're in good company. And it's not because your team lacks competence or tools. It's because the way most organizations approach vulnerability management was never designed for the reality we're facing today.

Here's what keeps me up at night: vulnerabilities aren't just one threat vector among many. They are the primary way attackers get in. Yes, social engineering plays a role, but exploiting vulnerabilities is how the vast majority of successful breaches actually happen. And here's the part that should bother every security leader, most of these breaches rely on vulnerabilities that have been publicly known for years. Not zero-days. Not sophisticated nation-state exploits. Known, unpatched weaknesses that we simply haven't gotten around to fixing.

So if we all know this, why are we still drowning?

The Vulnerability Tsunami

Let's start with basics. A vulnerability is a weakness in your IT systems, whether that's in application code, infrastructure, cloud configurations, or even security appliances from major vendors like Cisco or Microsoft. When exploitable, it becomes an entry point for attackers.

The problem we face today isn't discovering these vulnerabilities. Modern scanners, EDR, SAST, DAST, CSPM, detection capabilities are everywhere, and they work remarkably well. You're not blind to your vulnerabilities. You're overwhelmed by them.

New vulnerabilities are being disclosed faster than organizations can possibly remediate them. The backlog grows continuously. The noise increases. And somewhere in those thousands of findings, critical exposures that actually threaten your business get buried under medium-severity issues that will never be exploited. The disclosure curve looks exponential, but your remediation capacity? That stays basically flat.

This isn't a detection crisis. It's an execution crisis, and we need to stop pretending otherwise.

🤕 We're Solving the Wrong Problem

When organizations feel overwhelmed, what do they do? - They buy another detection tool. Deploy another scanner. Generate more alerts.

Which, of course, creates more silos, more dashboards, and exactly zero additional clarity about what actually needs fixing.

This approach made perfect sense 15 years ago, when finding vulnerabilities was genuinely difficult and the volumes were manageable. If you could discover them, you could fix them. That era is over, and we need to accept it.

That era is over.

Today, detection isn't your bottleneck: remediation is. Your scanners already produce thousands of findings every week. The real question isn't whether you can find vulnerabilities. It's which ones actually threaten your business, and how fast you can reduce that specific exposure. Yet in most enterprises, vulnerability management still sits inside the SOC, treated as a detection function rather than what it actually is: an operational program that requires coordination, prioritization, and sustained execution across multiple teams.

That structural misalignment is the root of the problem.

SOC Was Built for Incidents, Not Exposure Management

The Security Operations Center was designed for real-time threat detection and incident response.

It excels at:
- Monitoring alerts
- Investigating suspicious activity
- Containing active attacks
- Operating at high tempo

That's emergency medicine.

But vulnerability management isn't emergency medicine. It's risk reduction at scale.

It requires:
- Prioritizing thousands of findings down to the few that truly matter
- Understanding exploitability in your specific environment
- Coordinating remediation across IT, DevOps, and business teams
- Tracking risk reduction over time
- Managing a continuous program, not reacting to isolated events

This isn't incident response. It's preventive medicine. And preventive medicine requires a different operating model.

🚑 From Intensive Care to Epidemiology

Think about how the SOC operates. It's built like an intensive care unit: monitoring critical signals, detecting anomalies in real time, intervening immediately when something goes wrong, containing active threats before they spread. And that's absolutely essential work.

But vulnerability management doesn't belong in intensive care, because vulnerabilities aren't acute trauma. They're exposure vectors that create systemic risk across your entire environment.

If the SOC treats infected patients, the VOC needs to operate like epidemiology. Epidemiology doesn't focus on individual cases in isolation. It studies transmission patterns across populations, identifies the highest-risk groups, prioritizes interventions where spread is most likely, and breaks chains of contagion before hospitals overflow. That's the operational shift vulnerability management requires.

You don't stop a pandemic by building more ICU beds. You stop it by identifying vectors, reducing exposure systematically, and focusing intervention on the populations that matter most. The same principle applies to vulnerability management.

In practical terms, this means the SOC investigates the breach while the VOC reduces the conditions that make breaches inevitable in the first place. The SOC asks whether something is an active attack. The VOC asks where your systemic exposure exists and how fast you're actually reducing it. One treats incidents as they occur. The other reduces the probability that incidents will happen at all.

That's not a tooling difference or a reporting difference. It's an operating model difference, and as vulnerability volumes continue growing exponentially, trying to scale intensive care simply isn't sustainable. You need epidemiology. That's what the Vulnerability Operations Center represents.

Hackuity's Intelligent Asset Inventory (ACE).

Introducing the VOC: Vulnerability as an Operational Discipline

The Vulnerability Operations Center isn't just new terminology for the same old approach. It's recognition that vulnerability management has evolved into its own discipline—one that requires dedicated focus, systematic processes, clear metrics, and proper governance.

A mature VOC stands on three core pillars that directly mirror how epidemiology approaches population health.

1. Intelligence-Driven Prioritization
Not all vulnerabilities pose equal risk. A VOC identifies the actual unlocked doors and open windows in your environment: the specific exposures that are genuinely exploitable and relevant to your critical assets. The goal isn't cataloging every theoretical weakness your scanners can find. It's systematically eliminating the vulnerabilities that attackers will realistically use against you.

Like epidemiology, it's about identifying where intervention will have the highest impact, not treating every possible case with equal urgency.

2. Cross-Team Remediation Orchestration
Fixing vulnerabilities is almost neverva security-only task. It requires sustained coordination with infrastructure teams, cloud operations, DevOps, application developers, and often business stakeholders who need to understand the trade-offs.

A VOC builds the structured ownership, clear workflows, and accountability mechanisms that make remediation happen systematically rather than reactively. Think of it like contact tracing and intervention protocols in public health: clear processes that ensure exposure actually gets reduced at scale, not just identified and reported into a backlog that nobody owns.

3. Risk-Based Performance Measurement

Patch counts and SLA compliance percentages are easy to measure, but they don't necessarily tell you whether your actual exposure is decreasing.

A VOC tracks what matters: reduction of exploitable attack surface, time-to-remediate for critical exposures, recurrence patterns that indicate systemic weaknesses, and risk trends over time. The objective isn't demonstrating activity. The objective is proving measurable risk reduction

Just as epidemiologists track infection rates and transmission dynamics rather than simply counting how many tests got administered, a VOC measures outcomes that actually indicate whether your organization is becoming more secure.

Why This Shift Matters Now

For two decades, the cybersecurity industry has perfected detection. We've gotten exceptionally good at finding problems. Our tools can identify vulnerabilities at scale, correlate findings across environments, and generate detailed reports about everything that's wrong.

But finding 10,000 vulnerabilities doesn't make you safer. Fixing the 50 that genuinely threaten your critical operations does. As long as vulnerability management remains structurally embedded inside detection-centric operations, remediation will stay secondary to monitoring and alerting. And attackers will continue exploiting weaknesses we've known about for years.

The vulnerability landscape has fundamentally changed. The operating model needs to change with it.

The Bottom Line

The vulnerability tsunami isn't slowing down.

Your scanners will continue generating thousands of findings every month. The question isn't whether you can detect vulnerabilities. The question is whether your operating model is actually designed to reduce exposure at scale.

Vulnerability management can't remain a reporting exercise or a sub-function of the SOC. It's a core risk discipline that requires systemic thinking, coordinated action across multiple teams, and continuous focus on measurable risk reduction.

You can't ICU your way out of an epidemic. You need epidemiology: That's what the Vulnerability Operations Center is for.

I WANT TO KNOW MORE