2.C—Unique Credentials
>Control Description
Attackers are unable to reuse compromised credentials to move laterally across the organization, particularly between IT and OT networks.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.