RA-5 (5) What is the solution and how is it implemented?
RA-5 (6) Control Enhancement (M) (H)
The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.