graphgrc

SCF - AST-15 - Tamper Protection

Mechanisms exist to verify logical configuration settings and the physical integrity of critical technology assets throughout their lifecycle.

Mapped framework controls

ISO 27002

Control questions

Does the organization verify logical configuration settings and the physical integrity of critical technology assets throughout their lifecycle?