The organization protects information obtained from intrusion-monitoring tools from unauthorized access.
1 rule found Severity: Medium