Under active development Content is continuously updated and improved

RA-5(5)Vulnerability Scanning

Management

>Control Description

VULNERABILITY SCANNING | PRIVILEGED ACCESS The information system implements privileged access authorization to organization-identified information system components for selected organization-defined vulnerability scanning activities.

>Supplemental Guidance

In certain situations, the nature of the vulnerability scanning may be more intrusive or the information system component that is the subject of the scanning may contain highly sensitive information. Privileged access authorization to selected system components facilitates more thorough vulnerability scanning and also protects the sensitive nature of such scanning.

Ask AI

Configure your API key to use AI features.