💼 SA-15 (8) REUSE OF THREAT | VULNERABILITY INFORMATION
- Contextual name: 💼 SA-15 (8) REUSE OF THREAT | VULNERABILITY INFORMATION
- ID:
/frameworks/nist-sp-800-53-r4/sa/15/08
- Located in: 💼 SA-15 DEVELOPMENT PROCESS, STANDARDS, AND TOOLS
Description​
The organization requires the developer of the information system, system component, or information system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.
Similar​
- Internal
- ID:
dec-c-89a93e1d
- ID:
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|