Threat and Vulnerability Management. Vulnerability scans (authenticated and unauthenticated) must be performed, both internally and externally, for production systems. Processes must be in place to ensure tracking and remediation.
Appears in 6 contracts
Samples: Wisconsin Student Data Privacy Agreement, Data Processing Addendum, Data Processing Addendum