Under active development Content is continuously updated and improved

Article 26Article 26

>Control Description

Those carrying out cybersecurity certification, testing, risk assessment, or other such activities—or publicly publishing cybersecurity information such as system vulnerabilities, computer viruses, network attacks, or network incursions—shall comply with relevant national provisions.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.