Under active development Content is continuously updated and improved

2-12-42-12-4

>Control Description

Define IoT cybersecurity requirements for threat management as part of the overall threat modelling process developed by the organization. Implement the following practices as part of the IoT threat management plan: ▪ Monitor, track and aggregate threat intelligence data derived from the usage of IoT devices and services. ▪ Share information regarding breach indicators and threat intelligence with the National Cybersecurity Authority (NCA). ▪ Periodically review the cybersecurity requirements for threat management.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.