RV.2.1: Analyze each vulnerability to gather sufficient information about risk to plan its remediation or other risk response.
Example 1: Use existing issue tracking software to record each vulnerability.
Example 2: Perform risk calculations for each vulnerability based on estimates of its exploitability, the potential impact if exploited, and any other relevant characteristics.
CMMI Maturity
Description
Analyze each vulnerability to gather sufficient information about risk to plan its remediation or other risk response.