7.6—Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets
IG2
IG3
Software
Identify
>Control Description
Perform automated vulnerability scans of externally-exposed enterprise assets. Perform scans on a monthly, or more frequent, basis.
>Cross-Framework Mappings
>Relevant Technologies
Technology-specific guidance with authoritative sources and verification commands.
Ask AI
Configure your API key to use AI features.