Skip to main content

πŸ’Ό 11.3.1.2 Internal vulnerability scans are performed via authenticated scanning.

Description​

As follows:

  • Systems that are unable to accept credentials for authenticated scanning are documented.
  • Sufficient privileges are used for those systems that accept credentials for scanning.
  • If accounts used for authenticated scanning can be used for interactive login, they are managed in accordance with Requirement 8.2.2.

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0.1/11/03/01/02

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 11.3.1.2 Internal vulnerability scans are performed via authenticated scanning.

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 11.3.1.2 Internal vulnerability scans are performed via authenticated scanning.

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags