Skip to main content

💼 6.3 Security vulnerabilities are identified and addressed.

Description​

Empty...

Similar​

  • Internal
    • ID: dec-b-560ddceb

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags
💼 6.3.1 Security vulnerabilities are identified and managed.
💼 6.3.2 An inventory of bespoke and custom software, and third-party software components incorporated into bespoke and custom software is maintained to facilitate vulnerability and patch management.
💼 6.3.3 All system components are protected from known vulnerabilities by installing applicable security patches/updates2