• A Developing vulnerability management policies
  • B Analysis
  • C Discovering vulnerabilities
  • D Prioritization