摘要 |
A security and compliance testing system comprises a vulnerabilities, regulations, priority, and results database. A relational database maps the contents of the vulnerabilities and regulations databases to each other. A target is tested and discovered vulnerabilities are mapped to violated regulations with the relational database. The violations are then prioritized according to the priority database and a report generated and stored on the results database.
|