Professional Documents
Culture Documents
3. Discuss Vulnerability management and list the five steps involved in the process.
Define the wanted state of security.
Create baselines.
Prioritize vulnerabilities.
Mitigate vulnerabilities.
Monitor the environment.