Annex A 8.9 - Configuration Management
Configurations, including security configurations, of hardware, software, services, and networks shall be established, documented, implemented, monitored, and reviewed.
PreviousAnnex A 8.8 - Management of Technical VulnerabilitiesNextAnnex A 8.10 - Information Deletion
Last updated