RA-5(2) Vulnerability Monitoring and Scanning | Update Vulnerabilities to Be Scanned

Description

Due to the complexity of modern software, systems, and other factors, new vulnerabilities are discovered on a regular basis. It is important that newly discovered vulnerabilities are added to the list of vulnerabilities to be scanned to ensure that the organization can take steps to mitigate those vulnerabilities in a timely manner.

Applicability

The Office of Information Security is responsible for implementing this control.

Implementation

TAMU-CC shall update the system vulnerabilities to be scanned when new vulnerabilities are identified and reported.

Revision History

Last Updated: February 21, 2025

Previous Versions:

  • June 29, 2023
  • May 31, 2022
  • March 25, 2021
  • September 16, 2019