The organisation should establish and document a response structure with a designated person or teams for handling security vulnerabilities and threats. This includes defining and communicating roles, responsibilities, authority, and competence requirements. Documented procedures must be in place to guide the team's actions, including activation, operation, coordination, and communication, ensuring they can assess threats, activate responses, and manage incidents effectively.