Define and implement a process for tracking and reporting vulnerability identification and remediation activities that includes stakeholder notification.
The integrated TVM system should have comprehensive vulnerability tracking capabilities. Capabilities should include when discoveries were made and remediated, systems impacted, reasons for the delay (where applicable), and any communications that may have been made to stakeholders.
- Examine policy and procedures related to tracking and reporting of vulnerabilities.
- Examine the process to identify stakeholders.
- Determine if the process is implemented.
[csf.tools Note: For more information on the Cloud Controls Matrix, visit the CSA Cloud Controls Matrix Homepage.]
Cloud Control Matrix is Copyright 2023 Cloud Security Alliance.