2.2 The steps to be taken when a vulnerability has been identified