PE-3(2)—Facility And Systems
>Control Description
When determining the extent, frequency, and/or randomness of security checks of facilities, enterprises should account for exfiltration risks that result from covert listening devices. Such devices may include wiretaps, roving bugs, cell site simulators, and other eavesdropping technologies that can transfer sensitive information out of the enterprise.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.