Mechanisms exist to protect the confidentiality, integrity, availability and safety of endpoint devices.
Does the organization protect the confidentiality, integrity, availability and safety of endpoint devices?