SA-15(7)
SA-15(7): Automated Vulnerability Analysis
Require the developer of the system, system component, or system service [frequency at which to conduct vulnerability analysis is defined;] to:
- (a): Perform an automated vulnerability analysis using [tools used to perform automated vulnerability analysis are defined;];
- (b): Determine the exploitation potential for discovered vulnerabilities;
- (c): Determine potential risk mitigations for delivered vulnerabilities; and
- (d): Deliver the outputs of the tools and results of the analysis to [personnel or roles to whom the outputs of tools and results of the analysis are to be delivered is/are defined;].
Supplemental
Automated tools can be more effective at analyzing exploitable weaknesses or deficiencies in large and complex systems, prioritizing vulnerabilities by severity, and providing recommendations for risk mitigations.
| CIA Levels | |
|---|---|
| Confidentiality | unknown |
| Integrity | high |
| Availability | unknown |
| Overlays |
|---|
| DAF Baseline |
| CSF Categories |
|---|
| None |