A.8.8 Management of technical vulnerabilities