Employ vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.
No STIG checks reference this CCI.