HOME

RA-5 (3)

RA-5 (3) H M
Description

The organization employs vulnerability scanning procedures that can identify the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).