U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

NIST IR 8011 Vol. 4

Automation Support for Security Control Assessments: Software Vulnerability Management

Date Published: April 2020

Planning Note (02/22/2023):

The NIST Risk Management Framework (RMF) team seeks feedback on our NIST IR 8011 series publications and their use.

See the Call for Feedback to learn more details about what we would like to know. Feedback can be sent to 8011comments@list.nist.gov; there is no closing date.


Author(s)

Kelley Dempsey (NIST), Eduardo Takamura (NIST), Paul Eavy (DHS), George Moore

Abstract

Keywords

actual state; assessment; authorization boundary; automation; capability; Common Vulnerability and Exposure (CVE); Common Weakness Enumeration (CWE); dashboard; defect; desired state specification; dynamic code analyzer; Information Security Continuous Monitoring (ISCM); malicious code; malware; mitigation; ongoing assessment; patch management; root cause analysis; security capability; security control item; security control; software file; Software Identification (SWID) tag; software injection; software product; software vulnerability; software weakness; software; static code analyzer
Control Families

None selected

Documentation

Publication:
https://doi.org/10.6028/NIST.IR.8011-4
Download URL

Supplemental Material:
None available

Other Parts of this Publication:
IR 8011 Vol. 1
IR 8011 Vol. 2
IR 8011 Vol. 3

Document History:
11/20/19: IR 8011 Vol. 4 (Draft)
04/28/20: IR 8011 Vol. 4 (Final)