Title
AUTOMATED UNAUTHORIZED COMPONENT DETECTION
Description
The organization:
Supplemental
This control enhancement is applied in addition to the monitoring for unauthorized remote connections and mobile devices. Monitoring for unauthorized system components may be accomplished on an ongoing basis or by the periodic scanning of systems for that purpose. Automated mechanisms can be implemented within information systems or in other separate devices. Isolation can be achieved, for example, by placing unauthorized information system components in separate domains or subnets or otherwise quarantining such components. This type of component isolation is commonly referred to as sandboxing.
Reference Item Details
Related: AC-17,AC-18,AC-19,CA-7,RA-5,SI-3,SI-4,SI-7
Category: CONFIGURATION MANAGEMENT
Parent Title: INFORMATION SYSTEM COMPONENT INVENTORY
Family: CONFIGURATION MANAGEMENT
Baseline Impact: MODERATE,HIGH