Defines the process for conducting random vulnerability scans on the system and hosted applications.
No STIG checks reference this CCI.