RA-5(2) Vulnerability Monitoring and Scanning | Update Vulnerabilities to Be Scanned
Description
Due to the complexity of modern software, systems, and other factors, new vulnerabilities are discovered on a regular basis. It is important that newly discovered vulnerabilities are added to the list of vulnerabilities to be scanned to ensure that the organization can take steps to mitigate those vulnerabilities in a timely manner.
Applicability
The Office of Information Security is responsible for implementing this control.
Implementation
TAMU-CC shall update the system vulnerabilities to be scanned when new vulnerabilities are identified and reported.
Revision History
Last Updated: February 21, 2025
Previous Versions:
- June 29, 2023
- May 31, 2022
- March 25, 2021
- September 16, 2019