314.4(e)(2)—314.4(e)(2)
>Control Description
Utilizing qualified information security personnel employed by you or an affiliate or service provider sufficient to manage your information security risks and to perform or oversee the information security program;
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.