LLMPrompt CM.L2-3.4.2.b
Jump to navigation
Jump to search
For the assessment objective "[b] security configuration settings for information technology products employed in the system are enforced," rank the evidence types supported by assessment objects. Also, how should I prioritize the three assessment approaches in obtaining the evidence?