It Vulnerability Management Workflow
It Vulnerability Management Workflow
Vulnerability has
been identified
NO
NO NO
No action
needed
Vulnerability has been
triaged and prioritized
Identify remediation
options: patches,
configuration changes,
compensating controls, or
risk acceptance
Remediation action
NO
successful?
YES