Manage cybersecurity risks.
Describe the risk.
Enter relevant ISO 27001 controls, separated by commas.
Enter associated Feedback IDs, separated by commas.