Automated mechanisms exist to determine the state of system components with regard to flaw remediation.
Automated mechanisms exist to determine the state of system components with regard to flaw remediation.
Mechanisms exist to track the effectiveness of remediation operations through metrics reporting.
Automated mechanisms exist to install the latest stable versions of security-relevant software and firmware updates.
Mechanisms exist to remove old versions of software and firmware components after updated versions have been installed.
Mechanisms exist to detect vulnerabilities and configuration errors by recurring vulnerability scanning of systems and web applications.
Mechanisms exist to update vulnerability scanning tools.
Mechanisms exist to identify the breadth and depth of coverage for vulnerability scanning that define the system components scanned and types of vulnerabilities that are checked for.
Mechanisms exist to implement privileged access authorization for selected vulnerability scanning activities.
Automated mechanisms exist to compare the results of vulnerability scans over time to determine trends in system vulnerabilities.
Mechanisms exist to review historical event logs to determine if identified vulnerabilities have been previously exploited.