Skip to main content

💼 CM-8(3) Automated Unauthorized Component Detection (M)(H)

  • ID: /frameworks/fedramp-moderate-security-controls/cm/08/03

Description

(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [FedRAMP Assignment: automated mechanisms with a maximum five-minute delay in detection]; and [FedRAMP Assignment: continuously]

(b) Take the following actions when unauthorized components are detected: [Selection (one-or-more): disable network access by such components; isolate the components; notify [Assignment: organization-defined personnel or roles]].

Similar

  • Sections
    • /frameworks/fedramp-high-security-controls/cm/08/03
  • Internal
    • ID: dec-c-02513d7f

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 FedRAMP High Security Controls → 💼 CM-8(3) Automated Unauthorized Component Detection (M)(H)1no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (1)

PolicyLogic CountFlagsCompliance
🛡️ AWS GuardDuty is not enabled in all regions🟢1🟢 x6no data