|
|
G.2.5 Asset inventory
|
|
|
P.1.1 Product security requirements
|
|
|
P.2.3 Secure-by-default implementation
|
|
|
P.2.4 Standard security features
|
|
|
P.2.5 In-house components
|
|
|
P.2.6 Confirm Integrity of AI model data
|
|
|
P.3.1 Component and container choice
|
|
|
P.4.2 Automated security scanning tools
|
|
|
E.1.2 Version control
|