Problem
In a tabular form explain Risk Mitigation Strategy Security Controls Profile of Apple Inc, choose a security function from the NIST CSF which could be implemented to mitigate the identified risk. Then, review the Category and Sub-Category information for that function. Choose one or more sub-categories and enter those into your table in the CSF Category ID column.