Under active development Content is continuously updated and improved

Article 9.4(b)Article 9.4(b)

>Control Description

following a risk-based approach, establish a sound network and infrastructure management structure using appropriate techniques, methods and protocols that may include implementing automated mechanisms to isolate affected information assets in the event of cyber-attacks;

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.