1-7-2—1-7-2
>Control Description
Review and audit periodically by independent parties outside the cybersecurity function or by third party as part of the overall review and audit of cybersecurity requirements in the organization to ensure implementation and compliance with IoT cybersecurity requirements, and document the results.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.