Implement Vulnerability Management Step by Step