Choosing Your SLO Strategy

Risk-Based and CVSS Severity-Based Options

Overview

By default, Heeler sets Service Level Objectives (SLOs) based on Heeler’s risk-based prioritization, which evaluates vulnerabilities not only on severity but also on exploitability and business impact in your actual production environment. Heeler’s runtime threat modeling engine analyzes how code runs in production to generate business-aware attack paths, focusing your teams on vulnerabilities that are actually exploitable and material to your business.

This default strategy prioritizes effort where it most effectively reduces real-world risk.

However, many organizations operate under security or compliance frameworks (such as SOC 2, ISO 27001, FedRAMP, PCI DSS, or internal security standards) that require remediation timelines tied directly to CVSS severity ratings (Critical, High, Medium, Low). The Common Vulnerability Scoring System (CVSS) is an industry standard method for scoring the technical severity of vulnerabilities on a 0–10 scale. :contentReference[oaicite:0]{index=0}

Two SLO Setting Options

Heeler supports two ways to define SLOs:

1. Risk-Based SLOs (Heeler Priority) — Default

What it is: Risk-based SLOs are calculated using Heeler’s analysis of exploitability and business impact, which factors in contextual signals such as how a vulnerability is reachable and its effect on critical systems.

Why choose this:

  • Focus remediation on vulnerabilities that pose the greatest real-world risk

  • Reduce noise from high-severity findings that are unlikely to be exploited

  • Improve engineering efficiency by prioritizing based on exploitability and business impact

  • Align security and development around context-aware prioritization rather than purely theoretical severity

Risk-based approaches are widely recognized as effective because they consider multiple elements beyond a raw severity number, such as exploitability, business context, and threat intelligence.

2. CVSS Severity-Based SLOs — Compliance-Driven

What it is: Instead of using Heeler’s risk-based priority, administrators can define SLOs based on CVSS severity categories — Critical, High, Medium, and Low — which map to standard CVSS score ranges (e.g., 9.0–10.0 is Critical). This aligns remediation timelines with a widely adopted industry standard. :contentReference[oaicite:2]{index=2}

Why choose this:

  • Align with industry standards: CVSS severity is familiar across security, development, and compliance teams

  • Meet compliance requirements: Many frameworks explicitly reference CVSS severity for SLA tracking

  • Reduce ambiguity: Severity buckets simplify internal policies and auditor expectations

This option is especially suitable when your organization’s policies or auditors expect remediation timelines tied directly to CVSS severity rather than risk-aware scoring.

How to Select Your SLOs Strategy

  1. Select the icon from the top navigation

  2. Select Program

  3. In the Service Level Objectives (SLOs) section

  4. Choose the strategy and set remediation timelines (in days):

    • Heeler Priority

    • CVSS Severity

  5. Click Save

Once saved, SLOs will be re-calculated for all active findings.

Choosing Between the Two Strategies

Goal
Recommended SLO Setting

Compliance with standards

CVSS Severity

Risk reduction and exploit mitigation

Heeler Risk

Align engineering and compliance teams

CVSS Severity

Focusing on real-world exploitability

Heeler Risk

In practice, many organizations start with risk-based SLOs to focus on real-world impact and switch to CVSS severity when compliance needs demand clear severity buckets and defined remediation SLAs.

Last updated

Was this helpful?