RA-5 (8)     Vulnerability Scanning | Review Historic Audit Logs

The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.

                    
                

Applicable CNSSI 1253 Baselines

Confidentiality
  • L
  • M
  • H
Integrity
  • L
  • M
  • H
Availability
  • L
  • M
  • H

Related Controls