18.4—18.4
>Control Description
Validate security measures after each penetration test. If deemed necessary, modify rulesets and capabilities to detect the techniques used during testing.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.