7.5
IG2 IG3

Perform Automated Vulnerability Scans of Internal Enterprise Assets

Asset Type: Applications
Security Function: Identify

Description

Perform automated vulnerability scans of internal enterprise assets on a quarterly, or more frequent, basis. Conduct both authenticated and unauthenticated scans, using a SCAP-compliant vulnerability scanning tool.

Implementation Checklist

1
Document current state and create baseline inventory
2
Define data fields and attributes to track
3
Assign ownership and responsibilities
4
Establish review cadence and update procedures
5
Select and configure vulnerability scanning tool
6
Define scan scope, frequency, and credentials
7
Establish vulnerability remediation SLAs by severity
8
Create exception/waiver process for unremediated findings

Threats & Vulnerabilities (CIS RAM)

Threat Scenarios

Persistent Internal Vulnerabilities Exploited by Lateral Movement

Confidentiality

Without automated internal vulnerability scanning, attackers who gain initial access discover and exploit unpatched internal systems, databases, and applications that were never assessed, enabling rapid lateral movement through the environment.

Insider Exploitation of Undiscovered Internal Weaknesses

Integrity

Malicious insiders or compromised accounts exploit internal vulnerabilities that would have been detected by authenticated scanning, such as misconfigured services, default credentials, or missing patches on internal-only servers.

Compliance Gaps from Infrequent or Missing Internal Scans

Availability

Without quarterly automated internal scanning using SCAP-compliant tools, the organization cannot demonstrate continuous vulnerability assessment to auditors, resulting in findings under PCI DSS Requirement 11 or similar frameworks.

Vulnerabilities (When Safeguard Absent)

No Authenticated Internal Vulnerability Scanning

The organization does not perform credentialed internal vulnerability scans, meaning scanners cannot assess installed software versions, missing patches, or configuration weaknesses behind authentication barriers, missing up to 60% of actual vulnerabilities.

Infrequent or Manual Internal Scanning Cadence

Internal vulnerability scans are performed sporadically or only before audits rather than on an automated quarterly schedule, allowing new vulnerabilities to persist undetected for extended periods between scan windows.

Evidence Requirements

Type Evidence Item Collection Frequency
Document Current inventory or catalog documentation Maintained continuously, reviewed quarterly
Document Process/procedure documentation for identification activities Reviewed annually
Technical Vulnerability scan reports showing scope and findings Per scan cycle
Record Vulnerability remediation tracking with SLA compliance metrics Monthly
Document Governing policy document (current, approved, communicated) Reviewed annually