Under active development Content is continuously updated and improved

DCH-14.3Data Access Mapping

Weight: 9

>Control Description

Mechanisms exist to leverage data-specific Access Control Lists (ACL) or Interconnection Security Agreements (ISAs) to generate a logical map of the parties with whom sensitive/regulated data is shared.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.