Skip to content

Security Principle: G2; Revision: ; Updated: ; Applicability: ALL; Essential Eight: N/A

The identity and value of systems, applications and data is determined and documented.