Navigate
RA-5 (6)
RA-5 (6) Description
The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.
Supplemental
None
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | unknown |
Availability | unknown |
Overlays |
---|
Related Controls
The controls below (if any) were marked by NIST as being related to RA-5 (6).
Enhancements
The controls below (if any) add on to the requirements of RA-5 (6).
Control | Description |
---|---|
No controls |
Related CCIs
The CCIs below are tied to RA-5 (6).