SKIP TO PAGE CONTENT

RA-5(2) Update Vulnerabilities to Be Scanned

Initial Implementation: 11/18/24
Last Review: 10/15/2025

Statement

The University shall implement vulnerability scanning tools in a manner to insure new vulnerabilites are added to the list list of vulnerabilities to be scanned for to ensure identification and mitigation of those vulnerabilities in a timely manner.

Applicability

This Control applies to all West Texas A&M network information resources. The intended audience for this Control includes all information resource owners, custodians, and users of information resources.

Implementation

WTAMU shall employ commercally available vulnerability scanners, which are updated to the latest definitions and plug-ings with latest vulnerability information automatically on and regular and ongoing basis.

Phone
Twitter
Facebook
Instagram
Mail