Vulnerabilities in assets are identified, confirmed, and recorded.
Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and to inform the prioritization of risk response.
Risk responses are chosen, prioritized, planned, monitored, and communicated.
Established processes for receiving, analyzing, and responding to vulnerability disclosures.