C1.f—C1.f
>Control Description
Threats to the operation of network and information systems, and corresponding user and system behaviour, are sufficiently understood. These are used to detect cyber security incidents
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.