VPM-03.1—Vulnerability Exploitation Analysis
Weight: 5
>Control Description
Mechanisms exist to identify, assess, prioritize and document the potential impact(s) and likelihood(s) of applicable internal and external threats exploiting known vulnerabilities.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.