Use Info-Tech's Vulnerability Management Policy to define the parameters of vulnerability management, including the identification and remediation process behind the different vulnerabilities.
Use this tool in conjunction with the project blueprint, Develop and Deploy Security Policies.