3.2: Perform Authenticated Vulnerability Scanning

CSF v1.1 References:

Group:

Info icon.

The next version of the control set incorporates all or part of this control into: 7.5: Perform Automated Vulnerability Scans of Internal Enterprise Assets.

Control Statement

Perform authenticated vulnerability scanning with agents running locally on each system or with remote scanners that are configured with elevated rights on the system being tested.

[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]