Another random #pcidsscompliance thought. You cannot successfully argue that your vulnerability scanning solution is out of scope if it scans CDE systems and contains information about the vulnerabilities of such systems. Also, if you perform internal authenticated scans (which you do, right?), this system has stored creds for CDE systems.