Perform automated vulnerability scans of internal enterprise assets on a quarterly, or more frequent, basis. Conduct both authenticated and unauthenticated scans.
The organization has implemented a comprehensive strategy for automated vulnerability scans of internal assets, conducting both authenticated and unauthenticated scans with thorough coverage and regular analysis of results, and continuously enhancing tools and techniques based on findings to address security risks.