Skip to main content

πŸ’Ό 11.3.1 Internal vulnerability scans are performed.

Description​

As follows:

  • At least once every three months.
  • Vulnerabilities that are either high-risk or critical (according to the entity's vulnerability risk rankings defined at Requirement 6.3.1) are resolved.
  • Rescans are performed that confirm all high-risk and critical vulnerabilities (as noted above) have been resolved.
  • Scan tool is kept up to date with latest vulnerability information.
  • Scans are performed by qualified personnel and organizational independence of the tester exists.

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0/11/03/01
    • /frameworks/aws-fsbp-v1.0.0/inspector/01
    • /frameworks/aws-fsbp-v1.0.0/inspector/02

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Inspector.1] Amazon Inspector EC2 scanning should be enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [Inspector.2] Amazon Inspector ECR scanning should be enabled
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 11.3.1 Internal vulnerability scans are performed.3

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 11.3.1 Internal vulnerability scans are performed.3

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό 11.3.1.1 All other applicable vulnerabilities (those not ranked as high-risk or critical) are managed.
πŸ’Ό 11.3.1.2 Internal vulnerability scans are performed via authenticated scanning.
πŸ’Ό 11.3.1.3 Internal vulnerability scans are performed after any significant change.