4.D(2)(h)—Testing and Monitoring
>Control Description
Regularly test and monitor systems and procedures to detect actual and attempted attacks on, or intrusions into, Information Systems;
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.