END-06.2: Does the organization detect and respond to unauthorized configuration changes as cybersecurity incidents?

Mechanisms exist to detect and respond to unauthorized configuration changes as cybersecurity incidents.

Description

Mechanisms exist to detect and respond to unauthorized configuration changes as cybersecurity incidents.