1-3-2—1-3-2
>Control Description
Periodically review at planned intervals and if necessary, update the IoT cybersecurity roles and responsibilities as per organizational requirements, or upon changes to related laws and regulations.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.