Validate security measures after each penetration test. If deemed necessary, modify rulesets and
capabilities to detect the techniques used during testing.
The organization should after a penetration test:
The vulnerability management process is regularly tested at intervals specified by the organization to ensure that it is up-to-date, functional, and effective.
Organization carries out threat intelligence by analyzing and utilizing collected information about relevant cyber security threats related and corresponding protections.
When analyzing and utilizing the collected threat intelligence information, the following points must be taken into account: