RA-5(5)—Vulnerability Monitoring and Scanning | Privileged Access
>Control Description
Implement privileged access authorization to ⚙organization-defined system components for ⚙organization-defined vulnerability scanning activities.
Ask AI
Configure your API key to use AI features.