RA-5(6)—Vulnerability Scanning
Management
>Control Description
VULNERABILITY SCANNING | AUTOMATED TREND ANALYSES The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.
>Supplemental Guidance
Related controls: IR-4, IR-5, SI-4.
Ask AI
Configure your API key to use AI features.