1. /
  2. Security Response/
  3. Glossary/
  4. mitigating strategies

Glossary

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | _1234567890

mitigating strategies

Mitigating strategies enumerate and describe known methods to reduce the impact of a vulnerability or malicious code and lessen the likelihood of the vulnerability being exploited or the malicious code propagating. Mitigating strategies are derived from the fundamental principals of following best practice, using least privilege, and exercising defense in-depth. A mitigating strategy is not a workaround for a vulnerability. A workaround provides a temporary fix for the vulnerability and, if available, will be listed in the Solutions field of a vulnerability alert.