Basic steps for vulnerability remediation