Skip to content

Control: ism-1808; Revision: 0; Updated: Dec-22; Applicability: ALL; Essential Eight: ML3

A vulnerability scanner with an up-to-date vulnerability database is used for vulnerability scanning activities.