Use of Concept: need for additional requirement
Creator
Description
Owning Diagram
A3: Phase 3: Identify Cybersecurity Vulnerabilities
ICOM Details:
Output on Activity
A32 Conduct CVI Events and Document Results
.
Output inherited from Activity
A3 Phase 3: Identify Cybersecurity Vulnerabilities
.