Having worked on vulnerability management over a decade ago, it’s nice to finally see guidance focused on making patching a more integral part of the secure development lifecycle and not a compliance task.
NIST just quietly issued SSDFv1.2 and it's more runtime-security aware! In the v1.2 draft updates to SP 800-218, they add two big missing pieces: continuous improvement (explicitly driven by incidents and new threats) and secure update/patch delivery (realistic testing, rollback, staged rollout). That’s a clear shift from “write secure code” guidance toward “operate secure software” guidance. NIST is starting to understand that vulnerability management can’t live in spreadsheets and quarterly scans anymore. Good job NIST moving away from “shift left” and towards connecting left and right. The key is watching what’s actually happening at runtime and creating a fast feedback loop to development for *real* vulnerabilities shown to be exploitable in production and prioritized with architectural, threat, and business context from production. https://lnkd.in/eRzyNRbS