Mechanisms exist to implement privileged access authorization for selected vulnerability scanning activities.