Use of Concept: catalog of cybersecurity requirements
Creator
Description
Owning Diagram
A2: Phase 2: Characterize Attack Surface
ICOM Details:
Control inherited from Activity
A2 Phase 2: Characterize Attack Surface
.
Control on Activity
A21 Identify the Cyber-attack Surface
.