Mechanisms exist to facilitate the implementation and monitoring of vulnerability management controls.