7.5—Perform Automated Vulnerability Scans of Internal Enterprise Assets
IG2
IG3
Software
Identify
>Control Description
Perform automated vulnerability scans of internal enterprise assets on a quarterly, or more frequent, basis. Conduct both authenticated and unauthenticated scans.
>Cross-Framework Mappings
>Relevant Technologies
Technology-specific guidance with authoritative sources and verification commands.
Ask AI
Configure your API key to use AI features.