6.1.2(d)—6.1.2(d)
>Control Description
information describing the implemented cybersecurity functions of the ICT services or ICT products and the configuration required for their secure operation;
Ask AI
Configure your API key to use AI features.
Configure your API key to use AI features.