Vulnerability Scanning

Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.

ID: M0916
Version: 1.0
Created: 06 June 2019
Last Modified: 24 October 2022

Techniques Addressed by Mitigation

Domain ID Name Use
ICS T0819 Exploit Public-Facing Application

Regularly scan externally facing systems for vulnerabilities and establish procedures to rapidly patch systems when critical vulnerabilities are discovered through scanning and public disclosure.

ICS T0866 Exploitation of Remote Services

Regularly scan the internal network for available services to identify new and potentially vulnerable services.

ICS T0862 Supply Chain Compromise

Implement continuous monitoring of vulnerability sources. Also, use automatic and manual code review tools. [1]