Implementing a vulnerability management process