C3WG / DSMM

Data Security Maturity Model
5 stars 1 forks source link

P5: Repetition of ‘data’ and use of ‘critical assets’. #11

Closed GuillaumeRoss closed 1 year ago

GuillaumeRoss commented 1 year ago

Tidy our terminology in opening paragraph

-> See original doc for comment placement