3.4.2—Security Configuration Settings Assessment
>Control Description
Determine if: security configuration settings for information technology products employed in the system are established and included in the baseline configuration.; security configuration settings for information technology products employed in the system are enforced.
Ask AI
Configure your API key to use AI features.