VULNERABILITY AND THREAT MANAGEMENT - 5345-JUN-2014
(Revised: 06/2014)
Introduction: Threats and vulnerabilities provide the primary inputs to the state entity’s risk assessment process.
Policy: Each state entity shall continuously identify and remediate vulnerabilities before they can be exploited. Vulnerability and threat management include, but not limited to, the following:
- Strategic placement of scanning tools to continuously assess all information technology assets;
- Implementation of appropriate scan schedules, based on asset criticality;
- Communication of vulnerability information to system owners or other individuals responsible for remediation;
- Dissemination of timely threat advisories to system owners or other individuals responsible for remediation; and
- Consultation with system owners on mitigation strategies.
- Implementation of mitigation measures.
Implementation Controls: NIST SP 800-53: Risk Assessment (RA); System and Services Acquisition (SA); System and Communication Protection (SC)
Print Entire SAM Manual
Please bear with us, generating the entire SAM for printing will take approximately two minutes.