RA-5—Vulnerability Monitoring and Scanning
>Control Description
Monitor and scan for vulnerabilities in the system and hosted applications ⚙organization-defined frequency and/or randomly in accordance with organization-defined process and when new vulnerabilities potentially affecting the system are identified and reported;
Employ vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:
Enumerating platforms, software flaws, and improper configurations;
Formatting checklists and test procedures; and
Measuring vulnerability impact;
Analyze vulnerability scan reports and results from vulnerability monitoring;
Remediate legitimate vulnerabilities ⚙organization-defined response times in accordance with an organizational assessment of risk;
Share information obtained from the vulnerability monitoring process and control assessments with ⚙organization-defined personnel or roles to help eliminate similar vulnerabilities in other systems; and
Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.
>Related Controls
Ask AI
Configure your API key to use AI features.