Under active development Content is continuously updated and improved

2-10-22-10-2

>Control Description

Carry out red team exercises targeting mission critical IoT devices and services to simulate social engineering, physical intrusion, hacking and other deceptive techniques aimed at gaining unauthorized access to critical information and assets, where applicable.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.