If application vulnerability security assessments are performed:
i. Describe the tools and/or methods used (manual or automated, or a combination of both).
ii. Describe how it was observed that assessments are performed:
o At least annually
o After any changes
iii. Identify the organization(s) performing the assessments.
iv. Identify the responsible personnel interviewed, and describe how those reviewing the applications were confirmed to:
o Specialize in application security
o Demonstrate independence from the development team
v. Describe the observed process which confirm that:
o All identified vulnerabilities are corrected.
o Applications are re-evaluated after the corrections are applied.