Which NIST Cybersecurity Framework category ensures that organizational communication and data flows are mapped?
In accordance with PR.MA, an organization has just truncated all log files that are more than 12 months old.
This has freed up 25 TB per logging server.
What must be updated once the truncation is verified?
What common process conducted by organizations when protecting digital assets is outside the scope of the NIST Cybersecurity Framework?