Valid submissions are acknowledged and responded to inside of a well timed manner, taking into account the completeness and complexity of the vulnerability. Validated and exploitable weaknesses are mitigated according to their severity.A benchmark for important infrastructure operators to measure and increase their cybersecurity maturity. Improve