A. SLAs
B. Workflows
C. Service Catalog
D. Knowledge Base
A. Aggregations for priority and workload
B. Time period views
C. Up-to-the-minute views
D. Drill-down to granularity
A. On-demand update
B. Update
C. NVD Auto-update
D. CVE Auto-update
A. What techniques can restore capabilities?
B. What safeguards are available?
C. What techniques can contain impacts of incidents?
D. What techniques can identify incidents?
E. What processes and assets need protection?
A. Permanently removes the item from the list of Active Vulnerable items
B. Move the item to the Slushbucket
C. Has no impact on the list of Active Vulnerable Items
D. Temporarily removes the item from the list of Active Vulnerable items
A. Manual operations
B. Improved remediation
C. Automated prioritization
D. Enterprise risk trending