πΌ SA-15(8) Development Process, Standards, and Tools | Reuse of Threat and Vulnerability Information
- Contextual name: πΌ SA-15(8) Development Process, Standards, and Tools | Reuse of Threat and Vulnerability Information
- ID:
/frameworks/nist-sp-800-53-r5/sa/15/08
- Located in: πΌ SA-15 Development Process, Standards, and Tools
Descriptionβ
Require the developer of the system, system component, or system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.
Similarβ
- Sections
/frameworks/aws-fsbp-v1.0.0/guardduty/01
/frameworks/aws-fsbp-v1.0.0/ssm/01
- Internal
- ID:
dec-c-5a22535d
- ID:
Similar Sections (Take Policies From)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [GuardDuty.1] GuardDuty should be enabled | ||||
πΌ AWS Foundational Security Best Practices v1.0.0 β πΌ [SSM.1] Amazon EC2 instances should be managed by AWS Systems Manager |
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
πΌ NIST CSF v2.0 β πΌ ID.RA-01: Vulnerabilities in assets are identified, validated, and recorded | 22 |
Sub Sectionsβ
Section | Sub Sections | Internal Rules | Policies | Flags |
---|