Vulnerability Management Cadence for a Home Lab
A scanner run is not a vulnerability management program. The difference is cadence, prioritization, and verification. Even in a home lab, a light but consistent workflow keeps systems patched, reduces exposure, and builds habits that translate to larger environments.
This post outlines a weekly cadence that balances effort with real results.
Context
Problem: Ad hoc scanning leaves gaps and no consistent verification. Approach: A weekly cadence with inventory, scan tiers, and verification. Outcome: Predictable patching and fewer unknown exposures.
Start with a simple asset list
You cannot fix what you do not inventory. Keep a small list of hosts, services, and owners. A YAML or CSV file is fine.
1
2
3
4
5
6
7
8
9
10
# inventory.yaml
hosts:
- name: web-01
ip: 192.168.10.20
owner: lab
role: rails-app
- name: siem-01
ip: 192.168.10.30
owner: lab
role: opensearch
Keep it small and accurate. If a host is retired, remove it.
Define scan tiers
Not every asset needs the same depth. Split scans into tiers:
- Weekly: internet-facing services, VPN endpoints, and admin portals.
- Biweekly: internal servers with sensitive data.
- Monthly: low-risk lab systems.
For weekly scans, start with a fast port and service scan, then add targeted checks.
1
nmap -sV -T4 -oA scans/weekly/web-01 192.168.10.20
Prioritize findings by exposure and exploitability
Raw CVSS is noisy. Use a short rubric:
- Is the service internet-facing?
- Is there a known exploit (CISA KEV, Metasploit module)?
- Can the issue be mitigated by configuration?
Create a lightweight priority label and stick to it.
1
2
3
priority: P1 (internet-facing + known exploit)
priority: P2 (internal + exploit available)
priority: P3 (internal + no known exploit)
Track remediation in a simple log
A spreadsheet is enough. The key is to record when you found, fixed, and verified.
1
2
id,host,finding,priority,found,fix,verified,notes
2025-12-22-01,web-01,OpenSSL 1.1.1u,P2,2025-12-22,2025-12-23,2025-12-24,patched via apt
The “verified” column is non-negotiable. A fix without validation is a guess.
Add lightweight scanners
For web services, add a template-based scanner once per week. For containers, scan the image before deploy.
1
2
nuclei -u https://lab.example.local -o scans/weekly/nuclei.txt
trivy image mylab/app:latest
Keep the template set small to avoid noise.
Close the loop with verification
Re-scan after patching. If the issue persists, it was not fixed. Verification is what turns scanning into a program.
1
nmap -sV -oA scans/verify/web-01 192.168.10.20
Cadence checklist
- Update inventory when hosts are added or removed.
- Run weekly scan tier on Monday.
- Triage findings and assign priority.
- Patch and validate by end of week.
- Record verified fixes.
Takeaways
A small lab can still run a real vulnerability management cadence. Keep the inventory current, define scan tiers, prioritize by exposure, and always verify fixes. The habit is more valuable than the tool.