The test script currently does not really check whether any patch-level update that targets any critical CVEs is deployed in time.
Furthermore, the standard is a bit vague about whether this part is actually required or recommended.
Thirdly, could you make some kind of suggestion of how to best integrate with CVE check tools? For instance, the test script could accept a log file by one of these tools and just verify that the tool ran fine. You could then add this to the standard as a recommendation; I think we might get this in even with the now stable standard because it wouldn't turn any compliant clouds non-compliant.
The test script currently does not really check whether any patch-level update that targets any critical CVEs is deployed in time.
Furthermore, the standard is a bit vague about whether this part is actually required or recommended.
Thirdly, could you make some kind of suggestion of how to best integrate with CVE check tools? For instance, the test script could accept a log file by one of these tools and just verify that the tool ran fine. You could then add this to the standard as a recommendation; I think we might get this in even with the now stable standard because it wouldn't turn any compliant clouds non-compliant.