Post

Vulnerability Management Cadence for a Home Lab

Vulnerability Management Cadence for a Home Lab

A scanner run is not a vulnerability management program. The difference is cadence, prioritization, and verification. Even in a home lab, a light but consistent workflow keeps systems patched, reduces exposure, and builds habits that translate to larger environments.

This post outlines a weekly cadence that balances effort with real results.

Context

Problem: Ad hoc scanning leaves gaps and no consistent verification. Approach: A weekly cadence with inventory, scan tiers, and verification. Outcome: Predictable patching and fewer unknown exposures.

Start with a simple asset list

You cannot fix what you do not inventory. Keep a small list of hosts, services, and owners. A YAML or CSV file is fine.

1
2
3
4
5
6
7
8
9
10
# inventory.yaml
hosts:
  - name: web-01
    ip: 192.168.10.20
    owner: lab
    role: rails-app
  - name: siem-01
    ip: 192.168.10.30
    owner: lab
    role: opensearch

Keep it small and accurate. If a host is retired, remove it.

Define scan tiers

Not every asset needs the same depth. Split scans into tiers:

  • Weekly: internet-facing services, VPN endpoints, and admin portals.
  • Biweekly: internal servers with sensitive data.
  • Monthly: low-risk lab systems.

For weekly scans, start with a fast port and service scan, then add targeted checks.

1
nmap -sV -T4 -oA scans/weekly/web-01 192.168.10.20

Prioritize findings by exposure and exploitability

Raw CVSS is noisy. Use a short rubric:

  • Is the service internet-facing?
  • Is there a known exploit (CISA KEV, Metasploit module)?
  • Can the issue be mitigated by configuration?

Create a lightweight priority label and stick to it.

1
2
3
priority: P1 (internet-facing + known exploit)
priority: P2 (internal + exploit available)
priority: P3 (internal + no known exploit)

Track remediation in a simple log

A spreadsheet is enough. The key is to record when you found, fixed, and verified.

1
2
id,host,finding,priority,found,fix,verified,notes
2025-12-22-01,web-01,OpenSSL 1.1.1u,P2,2025-12-22,2025-12-23,2025-12-24,patched via apt

The “verified” column is non-negotiable. A fix without validation is a guess.

Add lightweight scanners

For web services, add a template-based scanner once per week. For containers, scan the image before deploy.

1
2
nuclei -u https://lab.example.local -o scans/weekly/nuclei.txt
trivy image mylab/app:latest

Keep the template set small to avoid noise.

Close the loop with verification

Re-scan after patching. If the issue persists, it was not fixed. Verification is what turns scanning into a program.

1
nmap -sV -oA scans/verify/web-01 192.168.10.20

Cadence checklist

  • Update inventory when hosts are added or removed.
  • Run weekly scan tier on Monday.
  • Triage findings and assign priority.
  • Patch and validate by end of week.
  • Record verified fixes.

Takeaways

A small lab can still run a real vulnerability management cadence. Keep the inventory current, define scan tiers, prioritize by exposure, and always verify fixes. The habit is more valuable than the tool.

This post is licensed under CC BY 4.0 by the author.