Glossary

Requirement 6: Develop and maintain secure systems

Target maintained patch management processes - The requirement was met on paper - However, the specific exploitation path used by the attackers did not rely on unpatched software --- it relied on credential theft and network architecture weaknesses

Learn More

Related Terms