CSCv6|4.2

Title

Correlate event logs with information from vulnerability scans.

Description

Correlate event logs with information from vulnerability scans to fulfill two goals. First, personnel should verify that the activity of the regular vulnerability scanning tools is itself logged. Second, personnel should be able to correlate attack detection events with prior vulnerability scanning results to determine whether the given exploit was used against a target known to be vulnerable.

Reference Item Details

Category: Continuous Vulnerability Assessment and Remediation

Family: System

Audit Items