Information security continuous monitoring (ISCM) strategy: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
(No difference)
| |
A strategy that establishes an ISCM program.
Source: NIST SP 800-137A | Category: