4.5.1—4.5.1
>Control Description
DoD Components procure and implement DRM and Protection solution(s) as needed, following the DoD Enterprise standard and requirements. Newly implement DRM and protection solution(s) are applied with high-risk data objects.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.