💼 SA-15 (8) REUSE OF THREAT | VULNERABILITY INFORMATION
- ID:
/frameworks/nist-sp-800-53-r4/sa/15/08
Description​
The organization requires the developer of the information system, system component, or information system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.
Similar​
- Internal
- ID:
dec-c-89a93e1d
- ID:
Sub Sections​
| Section | Sub Sections | Internal Rules | Policies | Flags | Compliance |
|---|