IR-4(6)—Insider Threats
>Control Description
This enhancement helps limit exposure of the C-SCRM information systems, networks, and processes to insider threats. Enterprises should ensure that insider threat incident handling capabilities account for the potential of insider threats associated with suppliers, developers, system integrators, external system service providers, and other ICT/OT-related service providers’ personnel with access to ICT/OT systems within the authorization boundary.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.