Under active development Content is continuously updated and improved

IR-4(6)Insider Threats

>Control Description

This enhancement helps limit exposure of the C-SCRM information systems, networks, and processes to insider threats. Enterprises should ensure that insider threat incident handling capabilities account for the potential of insider threats associated with suppliers, developers, system integrators, external system service providers, and other ICT/OT-related service providers’ personnel with access to ICT/OT systems within the authorization boundary.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.