3.1.2—3.1.2
>Control Description
Each entity must evaluate the potential impact in case of a security breach or service interruption of its own information assets, including developing a clear understanding of which activities, processes, and functions each individual information asset supports.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.