SKIP TO PAGE CONTENT

RA-5(2) Update Vulnerabilities to Be Scanned

Last Review: 11/18/24

Statement

The University shall implement vulnerability scanning tools in a manner to insure new vulnerabilites are added to the list list of vulnerabilities to be scanned for to ensure identification and mitigation of those vulnerabilities in a timely manner.

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.

Implementation

WTAMU shall employ commerically available vulnerability scanners which are updated to the latest with the latest vulnerability information automatically.

Phone
Twitter
Facebook
Instagram
Mail