Under active development Content is continuously updated and improved

11.4.4Exploitable vulnerabilities and security weaknesses found during penetration testing are corrected as follows: In accordance with the entity’s assessment of the risk posed by the security issue as defined in Require ment 6.

>Requirement Description

Exploitable vulnerabilities and security weaknesses found during penetration testing are corrected as follows: In accordance with the entity’s assessment of the risk posed by the security issue as defined in Require ment 6.3.1. Penetration testing is repeated to verify the corrections.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.