ISM-0120—ISM-0120
>Control Description
Cyber security personnel have access to sufficient data sources and tools to ensure that systems can be monitored for key indicators of compromise.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.