I. STANDARD STATEMENT
Good application security consists of knowledge of threats and regular feedback on the state of protection within an application.
II. RATIONALE
This standard supports HOP Policy 8-12 Information Resources Use and Security Policy.
III. SCOPE
This standard applies to all UTSA faculty, staff, and students.
IV. CONTACTS
If you have any questions about OIS 37 – Standard for Web Application Vulnerability Scanning contact the following office:
The Office of Information Security
V. PROCEDURES
- Business units and system administrators must be aware of the vulnerabilities that can exist within the applications so that appropriate actions can be taken to mitigate these risks. Vulnerability scanning is a procedure designed to identify security weakness in the application and to assist in mitigation of those weaknesses.
- All Web applications attached to the UTSA network are subject to security vulnerability scans. Proactive scanning allows for timely discovery of known risks and promotes actions to prevent compromise, breach and destructive activity within application and/or the network. Reactive security scanning provides a means of assessment and damage control.
- Scans are required:
Effective Date: April 22, 2012
Reviewed: June 8, 2020