Skip to main content

💼 CM-8(3) System Component Inventory | Automated Unauthorized Component Detection

  • Contextual name: 💼 CM-8(3) System Component Inventory | Automated Unauthorized Component Detection
  • ID: /frameworks/nist-sp-800-53-r5/cm/08/03
  • Located in: 💼 CM-8 System Component Inventory

Description​

(a) Detect the presence of unauthorized hardware, software, and firmware components within the system using [Assignment: organization-defined automated mechanisms] [Assignment: organization-defined frequency]; and (b) Take the following actions when unauthorized components are detected: [Selection (one or more): disable network access by such components; isolate the components; notify [Assignment: organization-defined personnel or roles]].

Similar​

  • Sections
    • /frameworks/aws-fsbp-v1.0.0/guardduty/01
    • /frameworks/aws-fsbp-v1.0.0/ssm/01
    • /frameworks/aws-fsbp-v1.0.0/ssm/02
    • /frameworks/aws-fsbp-v1.0.0/ssm/03
  • Internal
    • ID: dec-c-01e78c56

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlags
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [GuardDuty.1] GuardDuty should be enabled
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [SSM.1] Amazon EC2 instances should be managed by AWS Systems Manager
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [SSM.2] Amazon EC2 instances managed by Systems Manager should have a patch compliance status of COMPLIANT after a patch installation
💼 AWS Foundational Security Best Practices v1.0.0 → 💼 [SSM.3] Amazon EC2 instances managed by Systems Manager should have an association compliance status of COMPLIANT

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlags
💼 FedRAMP High Security Controls → 💼 CM-8(3) Automated Unauthorized Component Detection (M)(H)

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlags