Originally published at: CM.L2-3.4.2 - CMMC 2.0 Control Explorer - GRC Academy
Establish and enforce security configuration settings for information technology products employed in organizational systems.
Originally published at: CM.L2-3.4.2 - CMMC 2.0 Control Explorer - GRC Academy
Establish and enforce security configuration settings for information technology products employed in organizational systems.