Article 9.4(b)—Article 9.4(b)
>Control Description
following a risk-based approach, establish a sound network and infrastructure management structure using appropriate techniques, methods and protocols that may include implementing automated mechanisms to isolate affected information assets in the event of cyber-attacks;
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.