πΌ RA-5 VULNERABILITY SCANNING
- Contextual name: πΌ RA-5 VULNERABILITY SCANNING
- ID:
/frameworks/nist-sp-800-53-r4/ra/05
- Located in: πΌ RA RISK ASSESSMENT
Descriptionβ
The organization: RA-5a. Scans for vulnerabilities in the information system and hosted applications [Assignment: organization-defined frequency and/or randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the system/applications are identified and reported; RA-5b. Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for: RA-5b.1. Enumerating platforms, software flaws, and improper configurations; RA-5b.2. Formatting checklists and test procedures; and RA-5b.3. Measuring vulnerability impact; RA-5c. Analyzes vulnerability scan reports and results from security control assessments; RA-5d. Remediates legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an organizational assessment of risk; and RA-5e. Shares information obtained from the vulnerability scanning process and security control assessments with [Assignment: organization-defined personnel or roles] to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
Similarβ
- Internal
- ID:
dec-c-89257a0f
- ID:
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ NIST CSF v1.1 β πΌ DE.CM-8: Vulnerability scans are performed | 7 | 7 | ||
πΌ NIST CSF v1.1 β πΌ DE.DP-4: Event detection information is communicated | 30 | 33 | ||
πΌ NIST CSF v1.1 β πΌ DE.DP-5: Detection processes are continuously improved | 14 | 16 | ||
πΌ NIST CSF v1.1 β πΌ ID.RA-1: Asset vulnerabilities are identified and documented | 14 | 15 | ||
πΌ NIST CSF v1.1 β πΌ PR.IP-12: A vulnerability management plan is developed and implemented | 7 | 8 | ||
πΌ NIST CSF v1.1 β πΌ RS.CO-3: Information is shared consistent with response plans | 16 | 17 | ||
πΌ NIST CSF v1.1 β πΌ RS.MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks | 7 | 7 |