Dec. 06, 2022
December 6, 2022 Request for comment #17 - Policies and Procedures can in many instances contain sensitive information about the systems and their configuration for how cybersecurity is managed and implemented. Having these documents publicly available would provide attackers with valuable information and help identify attack vectors.