2.2.5—If any insecure services, protocols, or daemons are present: Business justification is documented.
>Requirement Description
If any insecure services, protocols, or daemons are present: Business justification is documented. Additional security features are documented and implemented that reduce the risk of using insecure services, protocols, or daemons.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.