This phase will allow you to take your vulnerabilities and begin to evaluate them. It includes triaging your vulnerabilities, as well as determining the risk they pose based on their intrinsic qualities and how they affect sensitive data or business-critical operations. This phase will take you through the following activities:

  • Triage vulnerabilities.
  • Evaluate identified vulnerabilities based on intrinsic qualities.
  • Determine high-level business criticalities.
  • Determine high-level data classifications.
  • Assign urgencies to vulnerabilities based on the classifications.
Use this phase as part of the full blueprint, Design and Implement a Vulnerability Management Program.

Also In

Design and Implement a Vulnerability Management Program

Know what to protect and know when you’re overprotecting.

Related Content


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019