2.3—2.3
>Control Description
Ensure that unauthorized software is either removed from use on enterprise assets or receives a documented exception. Review monthly, or more frequently.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.