Skip to main content
โ† All controls
RA-5 / SI-2 / A.12.6.1 / CIS-7.5 NIST SP 800-53 Rev 5

Vulnerability scans verify patch state

Demonstrate that vulnerability scanning tools accurately identify missing patches and validate successful patch deployment across all in-scope systems.

Description

What this control does

This control validates that automated vulnerability scanning tools accurately detect and report the patch status of operating systems and applications across the organization's asset inventory. Scanners compare installed software versions against vulnerability databases and vendor security bulletins to identify missing patches, outdated software, and vulnerable configurations. By cross-referencing scan results with patch management records, the organization confirms that vulnerability assessments reliably inform remediation priorities and that deployed patches are correctly detected post-installation.

Control objective

What auditing this proves

Demonstrate that vulnerability scanning tools accurately identify missing patches and validate successful patch deployment across all in-scope systems.

Associated risks

Risks this control addresses

  • Unpatched systems remain exploitable due to scanner misconfigurations or incomplete asset coverage, allowing attackers to exploit known vulnerabilities
  • False negatives in vulnerability scans create a false sense of security, leaving critical systems exposed to documented CVEs
  • Scanners fail to authenticate properly or lack necessary privileges, resulting in surface-level scans that miss installed patches or internal vulnerabilities
  • Patch deployment verification fails because scanners do not re-scan systems post-remediation, allowing vulnerable configurations to persist undetected
  • Outdated vulnerability feeds or scanner software prevent detection of newly disclosed vulnerabilities, creating a lag in threat awareness
  • Credential rotation or network segmentation prevents scanners from reaching critical systems, creating blind spots in vulnerability visibility
  • Discrepancies between patch management system records and actual system state go undetected, undermining compliance reporting and risk assessments

Testing procedure

How an auditor verifies this control

  1. Obtain the current vulnerability scanner configuration, including scan schedules, credential sets, target asset groups, and authenticated scan settings.
  2. Select a representative sample of systems across different asset types (servers, workstations, network devices) and operating systems from the most recent scan results.
  3. For each sampled system, compare vulnerability scan output against the organization's patch management database or change control records to verify consistency in reported patch levels.
  4. Manually inspect at least three sampled systems by directly querying installed software versions and patch states using native OS commands or inventory tools.
  5. Cross-reference identified vulnerabilities from scan reports with published CVE databases and vendor security advisories to confirm scanner accuracy and currency of vulnerability feeds.
  6. Review scanner authentication logs and scan completion reports to verify successful credential-based scans and identify any systems where authentication failed or scans were incomplete.
  7. Identify a recently patched system from patch management records, retrieve the corresponding pre-patch and post-patch vulnerability scan reports, and confirm the scanner detected patch installation and removed the associated vulnerability findings.
  8. Validate that scanner vulnerability feeds are updated automatically and review update logs for the past 90 days to confirm continuous synchronization with current threat intelligence.
Evidence required Collect vulnerability scan configuration exports showing authentication settings and scan frequency, recent scan reports for sampled systems with identified vulnerabilities and patch states, patch management system records documenting recent deployments, manual verification outputs from direct system queries showing installed patch levels, scanner authentication and completion logs demonstrating successful credentialed scans, vulnerability feed update logs confirming currency, and before/after scan comparisons for recently patched systems.
Pass criteria All sampled systems show consistent patch status between vulnerability scan reports and actual installed software versions, scanners successfully authenticate to all in-scope systems, recently deployed patches are detected and corresponding vulnerabilities are closed in subsequent scans, and vulnerability feeds are updated within vendor-specified intervals.

Where this control is tested

Audit programs including this control