2-8-1—2-8-1
>Control Description
Define, document, approve and implement IoT cybersecurity requirements for backup and recovery management as part of the organization's overall backup and recovery management policies and review periodically.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.