Mechanisms exist to verify the functionality of cybersecurity and data protection controls following implemented changes to ensure applicable controls operate as designed.
Does the organization verify the functionality of cybersecurity and/or data protection controls following implemented changes to ensure applicable controls operate as designed?
- wordsmithed control