Skip to main content

๐Ÿ’ผ SA-15 (8) REUSE OF THREAT | VULNERABILITY INFORMATION

Descriptionโ€‹

The organization requires the developer of the information system, system component, or information system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.

Similarโ€‹

  • Internal
    • ID: dec-c-89a93e1d

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags