Secure access to the IT system / information asset?
When clicking on this bar, you will be able to see the gaps within the category.
Access to the system must be protected by appropriate technical measures. This gap is removed by selecting “Yes” in the system description when user accesses are regulated with the appropriate measures (1).
It must be justified why ‘Secure access to the IT system/information asset’ is not relevant (2).