CM-7(7)—Code Execution In Protected Environments
>Control Description
The enterprise should obtain binary or machine-executable code directly from the OEM/developer or other acceptable, verified source.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.