Vulnerability identification (High and above)
- Category: Vulnerability management
- Points: 40
Rationale
Identifying high-risk vulnerabilities ensures they receive urgent attention to prevent exploitation that could lead to major security incidents or data breaches.
How to do it
Immediately log any high-risk vulnerabilities with detailed descriptions, severity ratings, and suggested remediations.
Expected Evidence
Upload a high-risk vulnerability report or screenshot, ensuring sensitive system details are removed.