609.930(c)(2)—609.930(c)(2)
>Control Description
Identify systems and software vulnerabilities, prioritize the vulnerabilities and the affected systems based on risk, and perform timely remediation. The particular security measures an institution adopts will depend upon the size, risk profile, and complexity of the institution's operations and activities.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.