6.**Exception/Acceptance Process:** If a vulnerability can be resolved, but not within the required time frame the exception process must be followed along with vulnerability remediation. If a vulnerability cannot be resolved the acceptance process must be followed and no further remediation will be required.
Note: The following steps are only required if a vulnerability can be remediated.
6.**Exception/Acceptance Process:** If a vulnerability can be resolved, but not within the required time frame the exception process must be followed along with vulnerability remediation. If a vulnerability cannot be resolved the acceptance process must be followed and no further remediation will be required. Note: The following steps are only required if a vulnerability can be remediated.
7.**Remediate Vulnerability:** Developers will remediate vulnerabilities by performing the following steps:
7.1.Update software and/or dependencies based on recommendations
7\.1.Update software and/or dependencies based on recommendations
7.2.Rescan impacted software and dependencies to ensure vulnerabilities are no longer detected
7\.2.Rescan impacted software and dependencies to ensure vulnerabilities are no longer detected
7.3.Update Issue status to Resolved. The following steps are to be used to close out vulnerabilities in the compliance report after they have been remediated:
7\.3.Update Issue status to Resolved. The following steps are to be used to close out vulnerabilities in the compliance report after they have been remediated:
- Locate the vulnerability assigned to you or your team. This can be done by using the dropdown filters and/or scrolling though listed vulnerabilities.
* Locate the vulnerability assigned to you or your team. This can be done by using the dropdown filters and/or scrolling though listed vulnerabilities.