SA-15(8)—Reuse Of Threat And Vulnerability Information
>Control Description
This enhancement encourages developers to reuse the threat and vulnerability information produced by prior development efforts and lessons learned from using the tools to inform ongoing development efforts. Doing so will help determine the C-SCRM activities described in Section 2 and Appendix C.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.