4-1-6—4-1-6
>Control Description
Review periodically IoT risk mitigation procedures and cybersecurity requirements, that are related to supply chain partners and third-party, to detect any unauthorized procedures.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.