Vulnerability Management Policy

1. Introduction

PagerTree is committed to maintaining a secure and resilient platform for our customers.

As part of this commitment, PagerTree maintains a formal Vulnerability Management Program designed to identify, assess, prioritize, and remediate security vulnerabilities across our systems, applications, and cloud infrastructure.

This policy outlines PagerTree’s approach to scanning, evaluating, and remediating vulnerabilities based on risk and severity.

2. Scope

This policy applies to:

  • All PagerTree-managed servers, services, applications, and cloud infrastructure
  • All source code, dependencies, and container images used within PagerTree systems
  • All employees and contractors responsible for development, infrastructure, operations, and security

3. Vulnerability Identification

PagerTree discovers vulnerabilities through multiple channels, including:

  • Automated vulnerability scans (SAST, SCA, dependency checks, container scans)
  • Cloud and infrastructure scanning tools
  • Penetration testing and security assessments
  • Bug bounty or coordinated vulnerability disclosures
  • Threat intelligence and vendor security advisories

PagerTree continuously monitors for new vulnerabilities in software components, libraries, and services used to deliver the PagerTree platform.


4. Severity Classification

PagerTree assigns a severity rating to each vulnerability based on:

  • Industry-standard scoring systems (e.g., CVSS)
  • Vendor or security researcher advisories
  • The relevance and exploitability in PagerTree’s environment
  • Potential impact to customer data or service availability

PagerTree may upgrade or downgrade severity using expert judgment to reflect actual risk.

Severity levels include:

  • Critical
  • High
  • Medium
  • Low
  • Informational

5. Remediation Timeframes

PagerTree prioritizes vulnerability remediation based on severity, impact, and exploitability.
The following timelines apply once a patch, mitigation, or validated remediation strategy is available:

Severity Required Timeframe
Critical Within 24 hours
High Within 1 week
Medium Within 1 month
Low Within 3 months
Informational As necessary

If no vendor patch is immediately available, PagerTree implements compensating controls (e.g., configuration changes, firewall rules, service isolation, monitoring enhancements) until full remediation is possible.

PagerTree continually reviews active vulnerabilities to ensure timely remediation aligned with these commitments.


6. Verification & Testing

Before deploying vulnerability fixes into production, PagerTree:

  • Tests patches and updates in controlled environments
  • Ensures compatibility with applications and services
  • Validates that remediation does not negatively impact availability or functionality

Post-remediation, PagerTree re-scans or verifies that the vulnerability has been resolved.


7. Reporting & Tracking

PagerTree maintains a centralized process for tracking vulnerabilities through:

  • Ticketing systems and automated workflow tools
  • Dashboards and reports reviewed by engineering and security teams
  • Escalations for past-due remediation items

PagerTree logs vulnerability information, remediation status, and closure evidence for audit purposes.


8. Third-Party & Dependency Risk

PagerTree evaluates vulnerabilities in:

  • Third-party services
  • Open-source components
  • SDKs and external integrations
  • Cloud service provider platforms

When a vulnerability affects a vendor or dependency:

  • PagerTree monitors updates from the provider
  • Applies patches as soon as they are released
  • Implements temporary mitigations when required

PagerTree maintains a software bill of materials (SBOM) approach through automated scanning tools.


9. Customer Notification

If a vulnerability impacts customer data or creates material risk:

  • PagerTree will assess the relevance and severity
  • Notify customers consistent with legal, contractual, and responsible disclosure practices
  • Provide guidance on any customer-side mitigations if applicable

PagerTree is committed to transparency and proactive communication.


10. Enforcement

Employees and contractors must follow PagerTree’s vulnerability management processes.
Failure to comply may result in:

  • Revoked access privileges
  • Reassignment of responsibilities
  • Disciplinary action or contract termination

11. Review and Maintenance

This Vulnerability Management Policy is reviewed at least annually, or whenever significant changes occur in systems, development practices, or threat landscape.

Updates are approved by PagerTree Executive Management.


For questions regarding this Vulnerability Management Policy or PagerTree’s security program, please contact security@pagertree.com.