Article 26—Article 26
>Control Description
Those carrying out cybersecurity certification, testing, risk assessment, or other such activities—or publicly publishing cybersecurity information such as system vulnerabilities, computer viruses, network attacks, or network incursions—shall comply with relevant national provisions.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.