Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

This phase will allow you to take your vulnerabilities and begin to evaluate them. It includes triaging your vulnerabilities, as well as determining the risk they pose based on their intrinsic qualities and how they affect sensitive data or business-critical operations. This phase will take you through the following activities:

  • Triage vulnerabilities.
  • Evaluate identified vulnerabilities based on intrinsic qualities.
  • Determine high-level business criticalities.
  • Determine high-level data classifications.
  • Assign urgencies to vulnerabilities based on the classifications.
Use this phase as part of the full blueprint, Design and Implement a Vulnerability Management Program.

Also In

Design and Implement a Vulnerability Management Program

Know what to protect and know when you’re overprotecting.


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.