The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.
Supplemental Guidance
Further Guidance
RA-5 (6) Guidance: include in Continuous Monitoring ISSO digest/report to JAB/AO