What is a Service-level agreement (SLA) primarily used for in the context of cybersecurity vulnerability management?
Directly reducing the time it takes to respond to and resolve cybersecurity incidents
Providing a detailed report of identified vulnerabilities and their potential impact
Keeping track of all the hardware and software inventory in the organization
Defining the expected service level, including responsiveness and resolution times, between the cybersecurity team and the organization