Under active development Content is continuously updated and improved

RA-5(3)Vulnerability Scanning

Secret (P2)
Management

>Control Description

VULNERABILITY SCANNING | BREADTH / DEPTH OF COVERAGE The organization employs vulnerability scanning procedures that can identify the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).

Ask AI

Configure your API key to use AI features.