1-5-2—1-5-2
>Control Description
Review the IoT devices and services to ensure that cybersecurity requirements are taken into consideration during planning & design phases of the information and technology projects.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.