DE.AE-07.305
Does your organization have a formal process to rapidly acquire, analyze, and respond to vulnerability disclosures affecting your technologies from suppliers, vendors, and third-party security advisories?
Explanation
This question assesses whether your organization has established procedures to stay informed about new vulnerabilities that could affect your systems and applications. An effective vulnerability disclosure monitoring process helps identify security weaknesses promptly, allowing for timely remediation before they can be exploited by threat actors. Evidence could include documentation of your vulnerability management process, screenshots of vulnerability tracking systems, subscription confirmations to vendor security advisories, or reports showing the timeline from vulnerability disclosure to analysis and remediation planning. A sample vulnerability bulletin or advisory distributed internally would also serve as good evidence.
Implementation Example
Rapidly acquire and analyze vulnerability disclosures for the organization's technologies from suppliers, vendors, and third-party security advisories
ID: DE.AE-07.305
Context
- Function
- DE: DETECT
- Category
- DE.AE: Adverse Event Analysis
- Sub-Category
- Cyber threat intelligence and other contextual information are integrated into the analysis

