Control: ism-1610; Revision: 0; Updated: Aug-20; Applicability: ALL; Essential Eight: N/A
A method of emergency access to systems is documented and tested at least once when initially implemented and each time fundamental information technology infrastructure changes occur.