2-2-1—2-2-1
>Control Description
Manage access identities and permissions to IoT assets and restrict access to IoT data, services and devices to authorized users only, based on access and permission control principles (need-to know-and-use, least privileges, and segregation of duties). In addition to managing privileged access accounts on IoT devices and services.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.