Skip to main content

💼 CM-8 (3) AUTOMATED UNAUTHORIZED COMPONENT DETECTION

Description​

The organization: CM-8 (3)(a) Employs automated mechanisms [Assignment: organization-defined frequency] to detect the presence of unauthorized hardware, software, and firmware components within the information system; and CM-8 (3)(b) Takes the following actions when unauthorized components are detected: [Selection (one or more): disables network access by such components; isolates the components; notifies [Assignment: organization-defined personnel or roles]].

Similar​

  • Internal
    • ID: dec-c-67ab4505

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags