RA-5(8)—Vulnerability Scanning
Management
>Control Description
VULNERABILITY SCANNING | REVIEW HISTORIC AUDIT LOGS The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.
>Supplemental Guidance
Related control: AU-6.
Ask AI
Configure your API key to use AI features.