Mechanisms exist to detect vulnerabilities and configuration errors by recurring vulnerability scanning of systems and web applications.