Mechanisms exist to review historical event logs to determine if identified vulnerabilities have been previously exploited.
Control Question
Assessment question for control validation
Does the organization review historical event logs to determine if identified vulnerabilities have been previously exploited?
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 2 - Operational
Tier 3 - Tactical
Core Control Designations
Special designations and baseline inclusions