CSF Implementation Example: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
A concise, action-oriented, notional illustration of a way to help achieve a CSF Core outcome.
Source: NIST Cybersecurity Framework 2.0 | Category: