CPL-03.4 ยท Assessment Methods

Control Description

Mechanisms exist to define acceptable methods to conduct a cybersecurity and/or data protection assessment.

Control Question
Assessment question for control validation

Does the organization define acceptable methods to conduct a cybersecurity and/or data protection assessment?

Control Weighting
7
Validation Cadence
Annual
NIST CSF Function
Govern
Supply Chain Risk Management (SCRM) Tiers
Applicable SCRM tier levels for this control
Tier 2 - Operational
Additional Metadata
Applicability (Process):
x
Errata & Additional Notes

- new control