RA-05 Vulnerability Scanning

Risk Assessment

Low Moderate High

Description

The organization scans for vulnerabilities in the information system [Assignment: organization-defined frequency] or when significant new vulnerabilities potentially affecting the system are identified and reported.\n

Supplemental Guidance

Vulnerability scanning is conducted using appropriate scanning tools and techniques. The organization trains selected personnel in the use and maintenance of vulnerability scanning tools and techniques. Vulnerability scans are scheduled and/or random in accordance with organizational policy and assessment of risk. The information obtained from the vulnerability scanning process is freely shared with appropriate personnel throughout the organization to help eliminate similar vulnerabilities in other information systems. Vulnerability analysis for custom software and applications may require additional, more specialized approaches (e.g., vulnerability scanning tools for applications, source code reviews, static analysis of source code). NIST Special Publication 800-42 provides guidance on network security testing. NIST Special Publication 800-40 (Version 2) provides guidance on patch and vulnerability management.\n

Changes from Rev 4

Title changed from 'Vulnerability Scanning' Control text adds requirement to employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned Discussion expanded to explain vulnerability monitoring Incorporates withdrawn control RA-5(1)

Enhancements

\n

Compliance Mappings

ISO 27002:2022

8.8

COBIT 2019

DSS05.07

CIS Controls v8

7.57.6

NIST CSF 2.0

ID.RA-01

SOC 2 TSC

CC3.2-POF7CC3.4-POF6CC7.1CC7.1-POF5CC9.2-POF13

ISO 17799 (legacy)

12.6.1

COBIT 4.1 (legacy)

PO9.3DS5.5