3.Secure Process Conformance
3.1 Verify Mutual Authentication of Wireless Communications3.2 – Test Encryption of Wireless Communication Channels3.3 Assess Trusted Supply Chain for Critical Components3.4 Evaluate Supply Chain Risk Management Process3.5 Confirm Use of Non-Proprietary Network Protocols
Was this helpful?