Mechanisms exist to implement privileged access authorization for selected vulnerability scanning activities.
Does the organization implement privileged access authorization for selected vulnerability scanning activities?