Under active development Content is continuously updated and improved

1.2Address Unauthorized Assets

IG1
IG2
IG3
Devices
Respond

>Control Description

Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.