Glossary  /  Frameworks

Glossary

What is CISA SSVC?

SSVC (Stakeholder-Specific Vulnerability Categorization) is CISA's framework for deciding which vulnerabilities to fix first. Unlike a single severity score, SSVC is a decision tree that produces an actionable verdict: Act, Attend, Track*, or Track.

Why SSVC exists

CVSS gives every vulnerability a number from 0 to 10. That number is the same whether the CVE affects an internet-facing crown-jewel server or an isolated lab box. SSVC adds the missing context: is anyone exploiting this?, is the affected asset reachable?, does the vulnerability automate?, what would the impact be if it succeeded?

The output isn't a number. It's a recommendation that maps to a workflow:

The inputs

How it pairs with KEV and EPSS

SSVC is the decision framework. KEV (Known Exploited Vulnerabilities) and EPSS (Exploit Prediction Scoring System) are the inputs. KEV says "this CVE is being exploited right now". EPSS says "this CVE has a 78% probability of being exploited in the next 30 days". Both feed straight into the SSVC tree.

How ThreatCluster uses it. Exposure Management ranks every asset in your inventory against your active threat feed using SSVC. Asset tagging (internet-facing, crown-jewel, isolated) populates the Exposure input. KEV listings and EPSS feed Exploitation Status. The output is a sorted patch list, not another spreadsheet of CVSS scores.

Why CTI teams care

CVSS is a vulnerability score. SSVC is an operational decision. A SOC manager with 50,000 vulnerabilities and 10 patching slots a week needs the second, not the first. The shift from "we have a critical CVSS" to "this is an Act per SSVC" is the difference between a report and a ticket.

See it in the live feed.

Concepts on this page show up in the platform every day. Sign up free to see them in action.