Under active development Content is continuously updated and improved

SA-15(8)Reuse Of Threat And Vulnerability Information

>Control Description

This enhancement encourages developers to reuse the threat and vulnerability information produced by prior development efforts and lessons learned from using the tools to inform ongoing development efforts. Doing so will help determine the C-SCRM activities described in Section 2 and Appendix C.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.