A cybersecurity analyst notices that their vulnerability management system flags potential software vulnerabilities. To address these vulnerabilities effectively, which type of control would the analyst primarily apply in patching the software?
Preventative
Corrective
Detective
Operational