3.4.2[a]—Security Configuration Settings Assessment [a]
>Control Description
security configuration settings for information technology products employed in the system are established and included in the baseline configuration.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.