The organization has defined processes for addressing identified vulnerabilities.
These processes should include at least the following:
- Identifying risks related to the vulnerability and the necessary actions (e.g. patching the system or other management tasks)
- Necessary actions are scheduled
- All actions taken are documented
The organization performs the actions necessary to prevent the vulnerability within the time limit set by the competent cyber incident prevention institution, but no later than 90 days after receiving the information, and informs the competent cyber incident prevention institution about the progress of the vulnerability prevention.
If, due to objective reasons, it is not possible to eliminate the vulnerability within the time limit specified, at the request of the organization, the cyber incident prevention institution may extend the deadline for the elimination of the vulnerability, but not more than 180 days from the moment of submitting the vulnerability detection report, by informing about it in the vulnerability detection report the submitter.