16.5—Use Up-to-Date and Trusted Third-Party Software Components
IG2
IG3
Software
Protect
>Control Description
Use up-to-date and trusted third-party software components. When possible, choose established and proven frameworks and libraries that provide adequate security. Acquire these components from trusted sources or evaluate the software for vulnerabilities before use.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.