AT-2(6)—Cyber Threat Environment
>Control Description
Provide literacy training on cyber threats specific to the enterprise’s supply chain environment. Enterprises should require their prime contractors to implement this control and flow down this requirement to relevant sub-level contractors
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.