Description

The application might be vulnerable if the application is:

Without a concerted, repeatable application security configuration process, systems are at a higher risk.

Further Reading