Under active development Content is continuously updated and improved

AT-2(6)Cyber Threat Environment

>Control Description

Provide literacy training on cyber threats specific to the enterprise’s supply chain environment. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-level contractors

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.