Vulnerability scanning is used to find potentially exploitable software vulnerabilities to remediate them.
Techniques Addressed by Mitigation
|Enterprise||T1190||Exploit Public-Facing Application||
Regularly scan externally facing systems for vulnerabilities and establish procedures to rapidly patch systems when critical vulnerabilities are discovered through scanning and through public disclosure.
|Enterprise||T1210||Exploitation of Remote Services||
Regularly scan the internal network for available services to identify new and potentially vulnerable services.
|Enterprise||T1195||Supply Chain Compromise||
Continuous monitoring of vulnerability sources and the use of automatic and manual code review tools should also be implemented as well.