1.2—1.2
>Control Description
Ensure that a process exists to address unauthorized assets on a weekly basis. The enterprise may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.