1-4-4—1-4-4
>Control Description
Conduct an IoT cybersecurity risk assessment considering potential IoT threats, potential scenarios for common IoT attacks, and potential for process disruption and associated damage.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.