Skip to main content

πŸ’Ό 6.3.1 Security vulnerabilities are identified and managed.

Description​

As follows:

  • New security vulnerabilities are identified using industry-recognized sources for security vulnerability information, including alerts from international and national computer emergency response teams (CERTs).
  • Vulnerabilities are assigned a risk ranking based on industry best practices and consideration of potential impact.
  • Risk rankings identify, at a minimum, all vulnerabilities considered to be a high-risk or critical to the environment.
  • Vulnerabilities for bespoke and custom, and third-party software (for example operating systems and databases) are covered.

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0/06/03/01
    • /frameworks/aws-fsbp-v1.0.0/inspector/03
    • /frameworks/aws-fsbp-v1.0.0/inspector/04

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Inspector.3] Amazon Inspector Lambda code scanning should be enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Inspector.4] Amazon Inspector Lambda standard scanning should be enabled
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 6.3.1 Security vulnerabilities are identified and managed.

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 6.3.1 Security vulnerabilities are identified and managed.

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags