2.3.1—2.3.1
>Control Description
The relevant entities shall review independently their approach to managing network and information system security and its implementation including people, processes and technologies.
Ask AI
Configure your API key to use AI features.