Use of Concept: catalog of cybersecurity requirements
Creator
Description
Owning Diagram
A21: Identify the Cyber-attack Surface
ICOM Details:
Control inherited from Activity
A21 Identify the Cyber-attack Surface
.
Control on Activity
A211 Examine System Architecture, Components, and Data Flows
.