7.4.1—7.4.1
>Control Description
Utilizing the baselines developed in the "User/Device Baselines" activity, threat profiles are created to assess the level of risk for individual subjects associated to the overall Component security. Profiles should be integrated into the "Orginization Access Profile" activity for decision making.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.