ID.IM.01:
Improvements are identified from evaluations
Implementation Examples
Ex1:
Perform self-assessments of critical services that take current threats and TTPs into consideration
Ex2:
Invest in third-party assessments or independent audits of the effectiveness of the organization's cybersecurity program to identify areas that need improvement
Ex3:
Constantly evaluate compliance with selected cybersecurity requirements through automated means