If a #vulnerability is identified, a #violation is created which closes automatically when the vulnerability has been remediated and no longer exists. This provides #audit-proof documentation of when the vulnerability was identified and when it was closed.
If a #vulnerability is identified, a #violation is created which closes automatically when the vulnerability has been remediated and no longer exists. This provides #audit-proof documentation of when the vulnerability was identified and when it was closed.