Configuring vulnerability scans
1. The organization's risk appetite is its willingness to tolerate risk within the environment
2. Regulatory requirements, such as PCI DSS or FISMA, may dictate a minimum frequency for vulnerability scans
3. Technical constraints may limit the frequency of scanning
4. Business constraints may limit the organization from conducting resource-intensive vulnerability scans during periods of high business activity to avoid disruption of critical processes
5. Licensing limitations may curtail the bandwidth consumed by the scanner or the number of scans that may be conducted simultaneously