Under active development Content is continuously updated and improved

VPM-03.1Vulnerability Exploitation Analysis

Weight: 5

>Control Description

Mechanisms exist to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats exploiting known vulnerabilities.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.