Continuous Vulnerability Management

Establish and maintain a risk-based remediation strategy documented in a remediation process, with monthly, or more frequent, reviews.


Login

Continuous Vulnerability Management

Perform operating system updates on enterprise assets through automated patch management on a monthly, or more frequent, basis.


Login

Continuous Vulnerability Management

Perform application updates on enterprise assets through automated patch management on a monthly, or more frequent, basis.


Login

Continuous Vulnerability Management

Perform automated vulnerability scans of internal enterprise assets on a quarterly, or more frequent, basis. Conduct both authenticated and unauthenticated scans, using a SCAP-compliant vulnerability scanning tool.


Login

Continuous Vulnerability Management

Perform automated vulnerability scans of externally-exposed enterprise assets using a SCAP-compliant vulnerability scanning tool. Perform scans on a monthly, or more frequent, basis.


Login

Continuous Vulnerability Management

Remediate detected vulnerabilities in software through processes and tooling on a monthly, or more frequent, basis, based on the remediation process.


Login

Audit Log Management

Establish and maintain an audit log management process that defines the enterprise’s logging requirements. At a minimum, address the collection, review, and retention of audit logs for enterprise assets. Review and update documentation annually, or when significant enterprise changes occur that could impact this Safeguard.


Login

Audit Log Management

Conduct reviews of audit logs to detect anomalies or abnormal events that could indicate a potential threat. Conduct reviews on a weekly, or more frequent, basis.


Login

Audit Log Management

Collect service provider logs, where supported. Example implementations include collecting authentication and authorization events, data creation and disposal events, and user management events.


Login

Audit Log Management

Collect audit logs. Ensure that logging, per the enterprise’s audit log management process, has been enabled across enterprise assets.


Login