A2.b—A2.b
>Control Description
You understand the capabilities, methods and techniques of threat actors and what network and information systems they may compromise to adversely impact your essential function(s).
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.