It is imperative that the activity promptly installs security-relevant software updates to mitigate the risk of new vulnerabilities. Flaws discovered during security assessments, continuous monitoring, incident response activities, or information system error handling, are also addressed expeditiously. By requiring that flaw remediation be incorporated into the configuration management process, it is the intent of this control that required/anticipated remediation actions are tracked and verified. |