RA-5(2) Update Vulnerabilities to Be Scanned
Last Review: 11/18/24
Statement
The University shall implement vulnerability scanning tools in a manner to insure new vulnerabilites are added to the list list of vulnerabilities to be scanned for to ensure identification and mitigation of those vulnerabilities in a timely manner.
Applicability
This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.