2-11—2-11
>Control Description
To ensure regular collection, monitoring and analysis of IoT cybersecurity event logs and threat cases, in order to enable early detection of a potential cyberattacks across IoT devices and services.
Ask AI
Configure your API key to use AI features.