The organization must have a formal procedure for reporting identified vulnerabilities to the national coordination body, CERT.PT. The report must be made without undue delay after a vulnerability is identified in the organization's own networks, systems, or in the ICT products and services it uses.
The procedure should define the roles and responsibilities for identifying, documenting, and submitting the vulnerability report to ensure it is handled promptly and directed to the correct authority.