Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.
|ICS||T0819||Exploit Public-Facing Application||
Regularly scan externally facing systems for vulnerabilities and establish procedures to rapidly patch systems when critical vulnerabilities are discovered through scanning and public disclosure.
|ICS||T0866||Exploitation of Remote Services||
Regularly scan the internal network for available services to identify new and potentially vulnerable services.
|ICS||T0862||Supply Chain Compromise||
Implement continuous monitoring of vulnerability sources. Also, use automatic and manual code review tools.