A rolling schedule of detection, reporting, and mitigation should be established so that all actions to address threats and non-conformance are performed on time and reported to the integrated TVM system for monitoring and oversight. In addition, where applicable, implement automation so that threats and non-conformance are mitigated on time.
Define, implement and evaluate processes, procedures and technical measures to update detection tools, threat signatures, and indicators of compromise on a weekly, or more frequent basis.