2-10-2—2-10-2
>Control Description
Carry out red team exercises targeting mission critical IoT devices and services to simulate social engineering, physical intrusion, hacking and other deceptive techniques aimed at gaining
unauthorized access to critical information and assets, where applicable.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.