RA-5(3)—Vulnerability Scanning
Secret (P2)
Management
>Control Description
VULNERABILITY SCANNING | BREADTH / DEPTH OF COVERAGE The organization employs vulnerability scanning procedures that can identify the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).
Ask AI
Configure your API key to use AI features.