rmfdb
CCI-000416
DescriptionThe organization employs automated mechanisms, per organization defined frequency, to detect the presence of unauthorized hardware, software, and firmware components within the information system.
Assessment ProcedureCM-8(3).2
Organization Guidance
Auditor Guidance
Control CM-8 (3) Information System Component Inventory | Automated Unauthorized Component Detection
STIG Rules
Loading...