1-4-3—1-4-3
>Control Description
Define and document IoT cybersecurity risks in the IoT cybersecurity risk register within the organization's overall cybersecurity risk register.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.