Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.
Domain | ID | Name | Use | |
---|---|---|---|---|
ICS | T0819 | Exploit Public-Facing Application |
Regularly scan externally facing systems for vulnerabilities and establish procedures to rapidly patch systems when critical vulnerabilities are discovered through scanning and public disclosure. |
|
ICS | T0866 | Exploitation of Remote Services |
Regularly scan the internal network for available services to identify new and potentially vulnerable services. |
|
ICS | T0862 | Supply Chain Compromise |
Implement continuous monitoring of vulnerability sources. Also, use automatic and manual code review tools. [1] |