Threat and Vulnerability Management. Vulnerability scans (authenticated and unauthenticated) must be performed, both internally and externally, for production systems. Processes must be in place to ensure tracking and remediation.
Appears in 6 contracts
Samples: Student Data Privacy Agreement, higherlogicdownload.s3.amazonaws.com, zoom.us