Under active development Content is continuously updated and improved

2.3Address Unauthorized Software

IG1
IG2
IG3
Software
Respond

>Control Description

Ensure that unauthorized software is either removed from use on enterprise assets or receives a documented exception. Review monthly, or more frequently.

>Cross-Framework Mappings

Ask AI

Configure your API key to use AI features.