SA-15(7)
SA-15(7): Automated Vulnerability Analysis
The organization requires the developer of the information system, system component, or information system service to:
- (a): Perform an automated vulnerability analysis using [organization-defined tools];
- (b): Determine the exploitation potential for discovered vulnerabilities;
- (c): Determine potential risk mitigations for delivered vulnerabilities; and
- (d): Deliver the outputs of the tools and results of the analysis to [organization-defined personnel or roles].
Supplemental
CIA Levels | |
---|---|
Confidentiality | unknown |
Integrity | high |
Availability | unknown |
Overlays |
---|
None |
CSF Categories |
---|
None |