last sync: 2025-May-01 19:36:43 UTC

Microsoft Managed Control 1558 - Vulnerability Scanning | Correlate Scanning Information | Regulatory Compliance - Risk Assessment

Azure BuiltIn Policy definition

Source Azure Portal
Display name Microsoft Managed Control 1558 - Vulnerability Scanning | Correlate Scanning Information
Id 65592b16-4367-42c5-a26e-d371be450e17
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 0
Built-in Versioning [Preview]
Category Regulatory Compliance
Microsoft Learn
Description Microsoft implements this Risk Assessment control
Cloud environments AzureCloud = true
AzureUSGovernment = true
AzureChinaCloud = unknown
Available in AzUSGov The Policy is available in AzureUSGovernment cloud. Version: '1.0.0'
Repository: Azure-Policy 65592b16-4367-42c5-a26e-d371be450e17
Additional metadata Name/Id: ACF1558 / Microsoft Managed Control 1558
Category: Risk Assessment
Title: Vulnerability Scanning | Correlate Scanning Information
Ownership: Customer, Microsoft
Description: The organization correlates the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
Requirements: Azure Security reviews all vulnerability reports produced by the scanning tools used within Azure. Azure Security then reviews the vulnerabilities with Azure service teams. Vulnerability information is then correlated using DevOps and analyzed from a high-level perspective to determine what the impact would be if particular vulnerabilities were exploited in the environment, and to determine the presence of multi-vulnerability/multi-hop attack vectors.
Mode Indexed
Type Static
Preview False
Deprecated False
Effect Fixed
audit
RBAC role(s) none
Rule aliases none
Rule resource types IF (2)
Compliance
The following 7 compliance controls are associated with this Policy definition 'Microsoft Managed Control 1558 - Vulnerability Scanning | Correlate Scanning Information' (65592b16-4367-42c5-a26e-d371be450e17)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
NIS2 PV._Posture_and_Vulnerability_Management_5 NIS2_PV._Posture_and_Vulnerability_Management_5 NIS2_PV._Posture_and_Vulnerability_Management_5 PV. Posture and Vulnerability Management Security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure n/a missing value 47
op.exp.2 Security configuration op.exp.2 Security configuration 404 not found n/a n/a 112
op.exp.3 Security configuration management op.exp.3 Security configuration management 404 not found n/a n/a 123
op.exp.4 Security maintenance and updates op.exp.4 Security maintenance and updates 404 not found n/a n/a 78
op.exp.5 Change management op.exp.5 Change management 404 not found n/a n/a 71
op.mon.3 Monitoring op.mon.3 Monitoring 404 not found n/a n/a 51
op.pl.1 Risk analysis op.pl.1 Risk analysis 404 not found n/a n/a 70
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
[Preview]: NIS2 32ff9e30-4725-4ca7-ba3a-904a7721ee87 Regulatory Compliance Preview BuiltIn unknown
Spain ENS 175daf90-21e1-4fec-b745-7b4c909aa94c Regulatory Compliance GA BuiltIn unknown
History none
JSON compare n/a
JSON
api-version=2021-06-01
EPAC