This is a dedicated watch page for a single video.
To maintain compliance with CIS Google Cloud Computing Foundations Benchmark v1.3.0 (CIS Google Cloud Foundation 1.3), your organization seeks to continuously evaluate its security posture. However, some controls are irrelevant and should be excluded from evaluation. How can you establish an automated system or process to ensure that only the relevant controls are assessed?