Under active development Content is continuously updated and improved

7.5Perform Automated Vulnerability Scans of Internal Enterprise Assets

IG2
IG3
Software
Identify

>Control Description

Perform automated vulnerability scans of internal enterprise assets on a quarterly, or more frequent, basis. Conduct both authenticated and unauthenticated scans.

>Cross-Framework Mappings

>Relevant Technologies

Technology-specific guidance with authoritative sources and verification commands.

Ask AI

Configure your API key to use AI features.