Word of the Day – February 9, 2019
vulnerability management process
Acronyms
- None
Preferred Term
- None
Non-standard Terms
- None
Definitions
Type | Definition | Sources |
---|---|---|
Noun | An established or official method for implementing the policy for vulnerability management or performing the tasks, processes, or operations for identifying, tracking, mitigating, and remediating any weakness in an information system, administrative controls, internal controls, system security practices and procedures, implementation, or physical layout that could be accidentally triggered or intentionally exploited by a threat in order to gain unauthorized access to information or disrupt processing. These activities must be executed in the same manner in order to obtain the same results in the same circumstances. (used 132 times in citations and controls) |
|
Other Forms
Type | Other Form |
---|---|
Plural | vulnerability management processes |
Plural Possessive | vulnerability management processes' |
Possessive | vulnerability management process's |
Relationships
Common Controls
Displaying Controls in which this term is tagged –
Show all Controls containing this term regardless of tagging
Displaying Controls containing this term –
Show only Controls in which this term is tagged
ID | Control |
---|---|
{{ control.id }} | {{ control.name }} |
None |
Citations
Displaying Citations in which
this term is tagged –
Show all Citations containing this term regardless of tagging
Displaying Citations containing this term –
Show only Citations in which
this term is tagged
AD ID | Authority Document | CT ID | Reference | Guidance | CC ID |
---|---|---|---|---|---|
{{ citation.authority_document.id }} | {{ citation.authority_document.common_name }} | {{ citation.id }} | {{ citation.reference }} | {{ citation.guidance_as_tagged || citation.guidance }} | {{ citation.control.id }} None |
None |