Identify mitigations
Expected mitigations for for example “Unauthorised access”, are expected to be in the areas of
Lock down environment
Establish and maintain control over all inputs
Establish and maintain control over all outputs
Expected mitigations for for example “Unauthorised access”, are expected to be in the areas of
Lock down environment
Establish and maintain control over all inputs
Establish and maintain control over all outputs