RA-5(7)—Vulnerability Scanning
Management
>Control Description
VULNERABILITY SCANNING | AUTOMATED DETECTION AND NOTIFICATION OF UNAUTHORIZED COMPONENTS
>Supplemental Guidance
Withdrawn: Incorporated into CM-8.
>Tailoring Guidance
Withdrawn: Incorporated into CM-8.
Ask AI
Configure your API key to use AI features.