4-1—4-1
>Control Description
To ensure the protection of the organizational assets against cybersecurity risks in the IoT devices, procured or operated by a third-party.
Ask AI
Configure your API key to use AI features.
Configure your API key to use AI features.