1-4-2—1-4-2
>Control Description
Define a list of common cybersecurity risk scenarios that could potentially impact the IoT devices and services, related ecosystem or the organization.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.