Keywords
actual state, assessment, authorization boundary, automation, capability, Common Vulnerability and Exposure (CVE), Common Weakness Enumeration (CWE), dashboard, defect, desired state specification, dynamic code analyzer, Information Security Continuous Monitoring (ISCM), malicious code, malware, mitigation, ongoing assessment, patch management, root cause analysis, security capability, security control item, security control, software file, Software Identification (SWID) tag, software injection, software product, software vulnerability, software weakness, software, static code analyzer