4-2-4—4-2-4
>Control Description
Establish procedures to facilitate cybersecurity audits, cybersecuriity monitoring of IoT-specific data manipulation activities, and management of potential risks associated with existence of a multi-tenant environment in the cloud, as part of the organization's cloud computing and hosting cybersecurity requirements.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.