How to Adapt Your Container Security Program to NIST's New NVD Enrichment Model

By

Introduction

On April 15, NIST officially changed how the National Vulnerability Database (NVD) enriches Common Vulnerabilities and Exposures (CVEs). Instead of scoring and mapping nearly every CVE, NIST now prioritizes only a subset. Most CVEs are still published, but they no longer automatically receive CVSS scores, CPE mappings, or CWE classifications—information that container scanners and compliance programs have long depended on. This isn't a temporary shift; NIST has stated it does not plan to return to full-coverage enrichment. For teams that built scanning, prioritization, and SLA workflows around the NVD as a secondary layer on top of CVE, it's time for a structured reassessment. This guide walks you through evaluating and updating your container security program to remain effective under the new model.

How to Adapt Your Container Security Program to NIST's New NVD Enrichment Model
Source: www.docker.com

What You Need

Step-by-Step Guide

Step 1: Understand What Changed

NIST now applies full enrichment only to three categories of CVEs:

  1. CVEs listed in CISA's Known Exploited Vulnerabilities catalog – enriched within one business day.
  2. CVEs affecting software used by the U.S. federal government.
  3. CVEs affecting “critical software” as defined in Executive Order 14028.

All other CVEs are moved to a “Not Scheduled” status. Organizations can request enrichment by emailing nvd@nist.gov, but no service-level timeline applies. Additionally, NIST no longer duplicates CVSS scores when the submitting CNA provides one, and all unenriched CVEs published before March 1, 2026 have been backdated to “Not Scheduled.”

Step 2: Audit Your Current NVD Dependencies

Review every tool and process in your container security pipeline that consumes NVD data. Ask:

Document each dependency and note whether it can be adjusted or replaced.

Step 3: Identify Which CVEs Matter Most to Your Containers

Map your container images and running workloads to the three priority categories. Even if your software isn't federal government or EO 14028 critical, you should monitor the CISA KEV catalog – those CVEs are enriched quickly. Also consider your own risk profile: which CVEs would cause the most harm if exploited? Prioritize enrichment for those.

Step 4: Adjust Your Enrichment Sources

Since NVD enrichment is no longer guaranteed, diversify where you get vulnerability data. Options include:

Step 5: Revise Prioritization and SLA Workflows

Without guaranteed NVD CVSS scores, your prioritization logic must change. Consider:

How to Adapt Your Container Security Program to NIST's New NVD Enrichment Model
Source: www.docker.com

Step 6: Communicate Changes to Stakeholders

Inform development, operations, and compliance teams about the shift. Explain that “No CVSS score” no longer means “low priority.” Update runbooks and dashboards to reflect new enrichment sources. Provide training if needed, especially for personnel who interpret vulnerability reports.

Step 7: Establish a Process for Requesting Enrichment

If you encounter a CVE that is critical to your containers but not in the priority categories, you can email nvd@nist.gov. Document this process: who submits, what information is needed (CVE ID, reason for request, impact), and set expectations that there is no guaranteed turnaround time. For high-urgency vulnerabilities, use other enrichment avenues first.

Step 8: Monitor and Iterate

The NVD landscape continues to evolve. Check NIST announcements, review your tools quarterly, and adjust your process as NIST expands or refines its enrichment model. Also track the volume of CVEs – NIST reported a 263% increase between 2020 and 2025, with Q1 2026 running a third higher year-over-year. More CVEs mean more chances for gaps.

Tips for Success

Tags:

Related Articles

Recommended

Discover More

Mastering Multi-Agent AI Collaboration at ScaleHow to Set Up Tesla Semi Charging Infrastructure: Basecharger & Megacharger GuideAncient Spanish Mines Uncovered: Solving Scandinavia's Bronze Age Metal Mystery10 Shocking Facts About the Motherboard Market Crash of 2025-2026Uber's Revenue Miss Triggers 10% Stock Surge: A Shift in Wall Street Valuation