6.5—6.5
>Control Description
The ability to determine if the complete set of planned, required, and deployed security controls within an information system or inherited by the system continue to be effective over time in light of the inevitable changes that occur.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.