How are potential new threats, vulnerabilities or exploitation techniques assessed?

Explain how potential new threats, vulnerabilities or exploitation techniques that could affect the service are assessed and how the appropriate corrective action is taken. Please provide a detailed explanation of how threats are detected, prioritised and mitigated, including all time scales.

Alloy periodically undergoes penetration testing both internally and by a third party, any potential vulnerabilities are identified and rectified in a prompt manner appropriate to the threat they represent.