ID.RA-01:

Vulnerabilities in assets are identified, validated, and recorded

Implementation Examples

Ex1: 

Use vulnerability management technologies to identify unpatched and misconfigured software

Ex2: 

Assess network and system architectures for design and implementation weaknesses that affect cybersecurity

Ex3: 

Review, analyze, or test organization-developed software to identify design, coding, and default configuration vulnerabilities

Ex4: 

Assess facilities that house critical computing assets for physical vulnerabilities and resilience issues

Ex5: 

Monitor sources of cyber threat intelligence for information on new vulnerabilities in products and services

Ex6: 

Review processes and procedures for weaknesses that could be exploited to affect cybersecurity