Under active development Content is continuously updated and improved

RA-5(8)Vulnerability Scanning

Management

>Control Description

VULNERABILITY SCANNING | REVIEW HISTORIC AUDIT LOGS The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.

>Supplemental Guidance

Related control: AU-6.

Ask AI

Configure your API key to use AI features.