threat and vulnerability management procedure
Definitions
Type | Definition | Sources |
---|---|---|
Record Example | A detailed description of the steps necessary to systematically perform vulnerability assessments, vulnerability scanning, penetration testing, cataloging of the assets that are in scope, assigning value and importance to those resources, and mitigating or eliminating any vulnerabilities discovered during the process. (used 18 times in citations and controls) |
|
Other Forms
Type | Other Form |
---|---|
Plural | threat and vulnerability management procedures |
Plural Possessive | threat and vulnerability management procedures' |
Possessive | threat and vulnerability management procedure's |
Relationships
Common Controls
Displaying Controls in which this term is tagged –
Show all Controls containing this term regardless of tagging
Displaying Controls containing this term –
Show only Controls in which this term is tagged
ID | Control |
---|---|
{{ control.id }} | {{ control.name }} |
None |
Citations
Displaying Citations in which
this term is tagged –
Show all Citations containing this term regardless of tagging
Displaying Citations containing this term –
Show only Citations in which
this term is tagged
AD ID | Authority Document | CT ID | Reference | Guidance | CC ID |
---|---|---|---|---|---|
{{ citation.authority_document.id }} | {{ citation.authority_document.common_name }} | {{ citation.id }} | {{ citation.reference }} | {{ citation.guidance_as_tagged || citation.guidance }} | {{ citation.control.id }} None |
None |