The policies, procedures and automated actions for recognizing potential threats and vulnerabilities in technology infrastructure and classifying their severity and potential impact.