DE.CM-08
Does your organization perform regular vulnerability scanning across all systems and applications?
Explanation
Regular vulnerability scanning helps identify security weaknesses in systems, applications, and network infrastructure before they can be exploited by attackers. These scans should be performed on a defined schedule (e.g., weekly, monthly) and after significant changes to the environment, with results documented and prioritized for remediation based on severity. Evidence could include recent vulnerability scan reports showing scan dates, coverage of systems, identified vulnerabilities with severity ratings, and remediation status tracking. Additional supporting documentation might include your vulnerability scanning policy that defines scan frequency, scope, and remediation timeframes.
Context
- Function
- DE: DETECT
- Category
- DE.CM: Continuous Monitoring
- Sub-Category
- Vulnerability scans are performed

