Use of Concept: cybersecurity T&E strategy
Creator
Description
Owning Diagram
A3: Phase 3: Identify Cybersecurity Vulnerabilities
ICOM Details:
Control inherited from Activity
A3 Phase 3: Identify Cybersecurity Vulnerabilities
.
Control on Activity
A31 Plan CVI Test Activities
.