SC-30—Concealment And Misdirection
>Control Description
Concealment and misdirection techniques for C-SCRM include the establishment of random resupply times, the concealment of location, randomly changing the fake location used, and randomly changing or shifting information storage into alternative servers or storage mechanisms.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.