This phase will allow you to build out the remediation process for vulnerabilities. This includes the establishment of the criteria needed for different remediation options, and the necessary steps prior to full implementation. This phase will take you through the following activities:
- Begin to document the remediation process for each vulnerability.
- Establish defense-in-depth modelling approach.
- Identify remediation options.
- Conduct backups before the remediation.
- Establish testing process before remediation.
- Remediate the vulnerabilities and verify.