

Call to action
Let’s look at the key steps to take when dealing with a vulnerability.
Remember, the process of vulnerability management is always more effective when the Configuration Management Database (CMDB) is well-maintained.
The more records are kept up-to-date, the more robust our vulnerability management process can be.
Take a moment to reflect on the following steps in dealing with vulnerability and select any that you’d like to adopt.