Threats and vulnerabilities shall be identified in all relevant assets, including software, network and system architectures, and facilities that house critical computing assets.
Threats and vulnerabilities shall be identified in all relevant assets, including software, network and system architectures, and facilities that house critical computing assets.
A process shall be established to continuously monitor, identify, and document vulnerabilities of the organisation's business critical systems.
A process shall be established to continuously monitor, identify, and document vulnerabilities of the organisation's business critical systems.
The organisation shall establish and maintain a documented process that enables continuous review, analysis and remediation of vulnerabilities and makes information sharing possible, where applicable.
The organisation shall establish and maintain a documented process that enables continuous review, analysis and remediation of vulnerabilities and makes information sharing possible, where applicable.
To ensure that organisation's operations are not adversely affected by the testing process, performance/load testing and penetration testing on the organisation’s systems shall be carried out with care.
To ensure that organisation's operations are not adversely affected by the testing process, performance/load testing and penetration testing on the organisation’s systems shall be carried out with care.
Vulnerability scanning shall not adversely impact system functions.
Vulnerability scanning shall not adversely impact system functions.
Vulnerabilities shall be identified and managed in all relevant assets, including software, network and system architectures, and facilities.
Vulnerabilities shall be identified and managed in all relevant assets, including software, network and system architectures, and facilities.