Description | The organization employs automated mechanisms, per organization defined frequency, to detect the presence of unauthorized hardware, software, and firmware components within the information system. |
---|---|
Assessment Procedure | CM-8(3).2 |
Organization Guidance | |
Auditor Guidance |