HOME

RA-5 (6)

RA-5 (6) H M
Description

The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.

Supplemental Guidance

Further Guidance

RA-5 (6) Guidance: include in Continuous Monitoring ISSO digest/report to JAB/AO

Related Controls