Inhibitors to Remediation
In classical mechanics, an object in motion stays in motion unless acted upon by an external force. In the reality of a Security Operations Center (SOC), a known vulnerability remains vulnerable unless acted upon by a patch. But just as physicists must account for the friction of the real world, security analysts must account for the institutional friction that prevents a straightforward fix. When your vulnerability scanner lights up with a critical Common Vulnerabilities and Exposures (CVE) alert, the mathematical severity of that flaw—its Common Vulnerability Scoring System (CVSS) base score—evaluates only the theoretical risk. The CVSS base score does not account for an organization's internal remediation inhibitors.

Vulnerability remediation inhibitors are the real-world organizational or technical factors that prevent the immediate application of security fixes. For the SOC analyst or incident responder, understanding these inhibitors is just as critical as analyzing the malicious payload of an exploit. If you cannot understand why a system administrator refuses to apply a patch, you cannot properly defend the network.
Let us break down the anatomy of why things cannot simply be "fixed," dividing these forces into organizational boundaries, technical physics, and the legacy weight of past decisions.