This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.
Jump to navigation Jump to search
|NIST SP 800-53 Rev. 4||RA-5|
Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.
Techniques Addressed by Mitigation
|Exploit Public-Facing Application||Regularly scan externally facing systems for vulnerabilities and establish procedures to rapidly patch systems when critical vulnerabilities are discovered through scanning and public disclosure.|
|Exploitation of Remote Services||Regularly scan the internal network for available services to identify new and potentially vulnerable services.|
|Supply Chain Compromise||Implement continuous monitoring of vulnerability sources. Also, use automatic and manual code review tools.1|