Mechanisms exist to verify the functionality of cybersecurity controls when anomalies are discovered.
Does the organization verify the functionality of cybersecurity controls when anomalies are discovered?