5.2.5—5.2.5
>Control Description
+ Information on technical vulnerabilities for the IT systems in use is gathered (e.g. information from the manufacturer, system audits, CVS database) and evaluated (e.g. Common Vulnerability Scoring System CVSS)
+ Potentially affected IT systems and software are identified, assessed and any vulnerabilities are addressed.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.