Skip to main content

💼 RA-5(7) Vulnerability Monitoring and Scanning | Automated Detection and Notification of Unauthorized Components

  • Contextual name: 💼 RA-5(7) Vulnerability Monitoring and Scanning | Automated Detection and Notification of Unauthorized Components
  • ID: /frameworks/nist-sp-800-53-r5/ra/05/07
  • Located in: 💼 RA-5 Vulnerability Monitoring and Scanning

Description​

[Withdrawn: Incorporated into CM-8.]

Similar​

  • Internal
    • ID: dec-c-8ace8dba

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags