threat and vulnerability management procedure

Acronyms

  • None

Preferred Term

  • None

Definitions

Type Definition Sources
Record Example A detailed description of the steps necessary to systematically perform vulnerability assessments, vulnerability scanning, penetration testing, cataloging of the assets that are in scope, assigning value and importance to those resources, and mitigating or eliminating any vulnerabilities discovered during the process. (used 18 times in citations and controls)
  • Per ISO 704:2009 methodology

Other Forms

Type Other Form
Plural threat and vulnerability management procedures
Plural Possessive threat and vulnerability management procedures'
Possessive threat and vulnerability management procedure's

Relationships

Loading...

Common Controls

Displaying Controls in which this term is tagged – Show all Controls containing this term regardless of tagging
Displaying Controls containing this term – Show only Controls in which this term is tagged
Loading...
ID Control
{{ control.id }} {{ control.name }}
None

Citations

Displaying Citations in which this term is tagged – Show all Citations containing this term regardless of tagging
Displaying Citations containing this term – Show only Citations in which this term is tagged
Loading...
AD ID Authority Document CT ID Reference Guidance CC ID
{{ citation.authority_document.id }} {{ citation.authority_document.common_name }} {{ citation.id }} {{ citation.reference }} {{ citation.guidance_as_tagged || citation.guidance }} {{ citation.control.id }} None
None