4.2—4.2
>Control Description
The ability to prevent or arrest software supply chain attacks, which occur "when a cyber threat actor infiltrates a software vendor’s network and employs malicious code to compromise the software before the vendor sends it to their customers."
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.