T-CO-3-6: Treatment of defects per protection requirement
Defining the protection requirement and the corresponding handling of vulnerabilities per severity for components like applications are aligned to SLAs. This is performed for the hole organization and doesn't need to be broken down (yet) on team/product/application. At least quarterly.
Description
The protection requirements for an application should consider: - Data criticality - Application accessibility (internal vs. external) - Regulatory compliance - Other relevant factors