7.6: Perform Automated Vulnerability Scans of Externally-Exposed Enterprise Assets
Threats Addressed:
Incorporates the following controls from the previous version: 3.1: Run Automated Vulnerability Scanning Tools, 9.3: Perform Regular Automated Port Scans, 12.2: Scan for Unauthorized Connections Across Trusted Network Boundaries.
Control Statement
Perform automated vulnerability scans of externally-exposed enterprise assets using a SCAP-compliant vulnerability scanning tool. Perform scans on a monthly, or more frequent, basis.
[csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]