主权项 |
1. A computer-implemented method comprising:
determining, using one or more computing devices, vulnerability data describing vulnerabilities of an information technology environment; assigning, using the one or more computing devices, each of the vulnerabilities to a stakeholder; receiving, using the one or more computing devices, a remediation proposal from the stakeholder of a first vulnerability for remediating the vulnerability; obtaining, using the one or more computing devices, an approval for the remediation proposal to remediate the first vulnerability as proposed; and facilitating remediation, using the one or more computing devices, of the first vulnerability based on the approval. |