Skip to main content

πŸ’Ό CM-8(3) System Component Inventory | Automated Unauthorized Component Detection

  • Contextual name: πŸ’Ό CM-8(3) System Component Inventory | Automated Unauthorized Component Detection
  • ID: /frameworks/nist-sp-800-53-r5/cm/08/03
  • Located in: πŸ’Ό CM-8 System Component Inventory

Description​

(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Assignment: organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and (b) Take the following actions when unauthorized components are detected: [Selection (one or more): disable network access by such components; isolate the components; notify [Assignment: organization-defined personnel or roles]].

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/guardduty/01
    • /frameworks/aws-fsbp-v1.0.0/ssm/01
    • /frameworks/aws-fsbp-v1.0.0/ssm/02
    • /frameworks/aws-fsbp-v1.0.0/ssm/03
  • Internal
    • ID: dec-c-01e78c56

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [GuardDuty.1] GuardDuty should be enabled
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SSM.1] Amazon EC2 instances should be managed by AWS Systems Manager
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SSM.2] Amazon EC2 instances managed by Systems Manager should have a patch compliance status of COMPLIANT after a patch installation
πŸ’Ό AWS Foundational Security Best Practices v1.0.0 β†’ πŸ’Ό [SSM.3] Amazon EC2 instances managed by Systems Manager should have an association compliance status of COMPLIANT

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
πŸ’Ό FedRAMP High Security Controls β†’ πŸ’Ό CM-8(3) Automated Unauthorized Component Detection (M)(H)

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags