Under active development Content is continuously updated and improved

RA-5(10)Vulnerability Scanning

Management

>Control Description

VULNERABILITY SCANNING | CORRELATE SCANNING INFORMATION The organization correlates the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.

Ask AI

Configure your API key to use AI features.