2.1.2(d)—2.1.2(d)
>Control Description
in line with an all-hazards approach, identify and document the risks posed to the security of network and information systems, in particular in relation to third parties and risks that could lead to disruptions in the availability, integrity, authenticity and confidentiality of the network and information systems, including the identification of single point of failures;
Ask AI
Configure your API key to use AI features.