Under active development Content is continuously updated and improved

5.2.55.2.5

>Control Description

+ Information on technical vulnerabilities for the IT systems in use is gathered (e.g. information from the manufacturer, system audits, CVS database) and evaluated (e.g. Common Vulnerability Scoring System CVSS) + Potentially affected IT systems and software are identified, assessed and any vulnerabilities are addressed.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.