๐ผ SA-15 (8) REUSE OF THREAT | VULNERABILITY INFORMATION
- Contextual name: ๐ผ SA-15 (8) REUSE OF THREAT | VULNERABILITY INFORMATION
- ID:
/frameworks/nist-sp-800-53-r4/sa/15/08
- Located in: ๐ผ SA-15 DEVELOPMENT PROCESS, STANDARDS, AND TOOLS
Descriptionโ
The organization requires the developer of the information system, system component, or information system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.
Similarโ
- Internal
- ID:
dec-c-89a93e1d
- ID:
Sub Sectionsโ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|