RA-5(10)—Vulnerability Scanning
Management
>Control Description
VULNERABILITY SCANNING | CORRELATE SCANNING INFORMATION The organization correlates the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
Ask AI
Configure your API key to use AI features.