Under active development Content is continuously updated and improved

2.2.5If any insecure services, protocols, or daemons are present: Business justification is documented.

>Requirement Description

If any insecure services, protocols, or daemons are present: Business justification is documented. Additional security features are documented and implemented that reduce the risk of using insecure services, protocols, or daemons.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.