Under active development Content is continuously updated and improved

PE-3(2)Facility And Systems

>Control Description

When determining the extent, frequency, and/or randomness of security checks of facilities, enterprises should account for exfiltration risks that result from covert listening devices. Such devices may include wiretaps, roving bugs, cell site simulators, and other eavesdropping technologies that can transfer sensitive information out of the enterprise.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.