Request a cybersecurity risk assessment to identify and assess potential threats, vulnerabilities, and risks within a defined scope, such as your organization, information system, application, and process.
Request for an exception for issues identified through vulnerability scan or another compliance issue that can't be resolved. Request must include a plan to mitigate the vulnerability.