Keywords
actual state, assessment, assessment boundary, assessment method, authorization boundary, automated assessment, automation, capability, continuous diagnostics and mitigation, dashboard, defect, defect check, desired state specification, software asset management, information security continuous monitoring, firmware, ISCM dashboard, inventory management, malware, malicious code, mobile code, mitigation, ongoing assessment, root cause analysis, security automation, security capability, security control, security control assessment, security control item, software executable, SWID tag, software injection, software product, software whitelisting