UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must employ automated mechanisms or must have an application installed that, on an organization defined frequency determines the state of information system components with regard to flaw remediation.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36734 WN08-GE-000028 SV-48383r2_rule VIVM-1 Medium
Description
Organizations are required to identify information systems containing software affected by recently announced software flaws (and potential vulnerabilities resulting from those flaws) and report this information to designated organizational officials with information security responsibilities (e.g., senior information security officers, information system security managers, information systems security officers). To support this requirement, an automated process or mechanism is required.
STIG Date
Windows 8 / 8.1 Security Technical Implementation Guide 2015-11-30

Details

Check Text ( C-45052r1_chk )
Verify the organization has an automated process to scan systems for identified software flaws and vulnerabilities. If it does not, this is a finding.
Fix Text (F-41514r1_fix)
Establish an automated process to scan systems for identified software flaws and vulnerabilities.