v1.0
L1 EssentialAutomated verification
6.4 Dependency Vulnerability Scanning
6. Supply Chain Integrity — How do we trust components?
Description
All dependencies MUST be scanned for known vulnerabilities.
Rationale
Dependencies frequently contain known vulnerabilities. Regular scanning catches them before exploitation.
Audit Procedure
1. Run vulnerability scanner (npm audit, pip-audit) 2. Check for critical/high vulnerabilities 3. Verify scanning is in CI/CD
Remediation
1. Run regular vulnerability scans 2. Integrate scanning into CI/CD 3. Update vulnerable dependencies promptly
Framework Mappings
CIS Control 7.4NIST ID.RA-1OWASP LLM05:2023