RA-5 (8) Vulnerability Scanning | Review Historic Audit Logs
The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.
Applicable CNSSI 1253 Baselines
Confidentiality
- L
- M
- H
Integrity
- L
- M
- H
Availability
- L
- M
- H