The organization shall monitor and scan for vulnerabilities in its critical systems and hosted applications ensuring that system functions are not adversely impacted by the scanning process.
The vulnerability scanning process shall include analysis, remediation, and information sharing.